Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3ClBcOpPUX.exe

Overview

General Information

Sample name:3ClBcOpPUX.exe
renamed because original name is a hash value
Original sample name:aed92a8301931959100a1bb8c52251df2fdddaf8b76ab34b6f24d7bbe58a4fe6.exe
Analysis ID:1590401
MD5:77515669c23c08469a95333a8d43be63
SHA1:2cea71874e735ab23b2580b03e0afadbbadf0bd4
SHA256:aed92a8301931959100a1bb8c52251df2fdddaf8b76ab34b6f24d7bbe58a4fe6
Tags:CyberGateexekalintz-40214-portmap-hostuser-johnk3r
Infos:

Detection

CyberGate
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CyberGate RAT
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Files With System Process Name In Unsuspected Locations
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
One or more processes crash
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Common Autorun Keys Modification
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • 3ClBcOpPUX.exe (PID: 6412 cmdline: "C:\Users\user\Desktop\3ClBcOpPUX.exe" MD5: 77515669C23C08469A95333A8D43BE63)
    • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
    • explorer.exe (PID: 2708 cmdline: explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
    • 3ClBcOpPUX.exe (PID: 7304 cmdline: "C:\Users\user\Desktop\3ClBcOpPUX.exe" MD5: 77515669C23C08469A95333A8D43BE63)
      • svchost.exe (PID: 7532 cmdline: "C:\Windows\system32\System\svchost.exe" MD5: 77515669C23C08469A95333A8D43BE63)
        • WerFault.exe (PID: 7608 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 564 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 6996 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 4512 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6340 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 968 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 4948 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 5172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7256 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7548 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 7584 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 7532 -ip 7532 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 7652 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CyberGateAccording to Subex Secure, CyberGate is a Remote Access Trojan (RAT) that allows an attacker to gain unauthorized access tothe victims system. Attackers can remotely connect to the compromised system from anywherearound the world. The Malware author generally uses this program to steal private informationlike passwords, files, etc. It might also be used to install malicious software on the compromisedsystems.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cybergate
{"C2 list": ["kalintz-40214.portmap.host:40214"], "Campaign": "ID", "Password": "123", "InstallFlag": "TRUE", "InstallDir": "System", "InstallFileName": "svchost.exe", "ActiveXStartup": "{B4C7TF7E-V451-D2XH-Q4F8-64T3431A5V51}", "REGKeyHKLM": "SAQ", "REGKeyHKCU": "JSA", "EnableMessageBox": "FALSE", "MessageBoxIcon": "16", "MessageBoxButton": "0", "InstallMessage": "texto da mensagem", "ActivateKeylogger": "TRUE", "KeyloggerBackspace": "TRUE", "KeyloggerEnableFTP": "FALSE", "FTPAddress": "ftp.server.com", "FTPDirectory": "./logs/", "FTPUserName": "ftp_user", "FTPPort": "21", "FTPInterval": "30", "ProcessInjection": "0", "ProcessNameForInjection": "explorer.exe", "Persistance": "TRUE", "HideFile": "TRUE", "ChangeCreationDate": "TRUE", "Mutex": "***MUTEX***", "MeltFile": "FALSE", "CyberGateVersion": "2.6", "StartupPolicies": "Policies", "USBSpread": "FALSE"}
SourceRuleDescriptionAuthorStrings
3ClBcOpPUX.exeJoeSecurity_CyberGateYara detected CyberGate RATJoe Security
    3ClBcOpPUX.exeWindows_Trojan_CyberGate_517aac7dunknownunknown
    • 0xb540:$a1: IELOGIN.abc
    • 0x92e8:$a2: xxxyyyzzz.dat
    • 0xb4e8:$a3: _x_X_PASSWORDLIST_X_x_
    • 0x7330:$a4: L$_RasDefaultCredentials#0
    • 0xa1b4:$a5: \signons1.txt
    3ClBcOpPUX.exeWindows_Trojan_CyberGate_9996d800unknownunknown
    • 0xa3a2:$a1: 24 08 8B 44 24 08 83 C4 14 5D 5F 5E 5B C3 55 8B EC 83 C4 F0
    3ClBcOpPUX.exeRAT_CyberGateDetects CyberGate RATKevin Breen <kevin@techanarchy.net>
    • 0xd781:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd872:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd87f:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd92c:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd939:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd946:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd953:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd960:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd96d:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd97a:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd987:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd994:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd9c0:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd9cd:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd9da:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd81a:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd88c:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd902:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd910:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd91e:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd9fb:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    3ClBcOpPUX.exeCyberGateunknown Kevin Breen <kevin@techanarchy.net>
    • 0xd781:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd872:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd87f:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd92c:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd939:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd946:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd953:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd960:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd96d:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd97a:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd987:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd994:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd9c0:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd9cd:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd9da:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
    • 0xd81a:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd88c:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd902:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd910:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd91e:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    • 0xd9fb:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Windows\SysWOW64\System\svchost.exeJoeSecurity_CyberGateYara detected CyberGate RATJoe Security
      C:\Windows\SysWOW64\System\svchost.exeWindows_Trojan_CyberGate_517aac7dunknownunknown
      • 0xb540:$a1: IELOGIN.abc
      • 0x92e8:$a2: xxxyyyzzz.dat
      • 0xb4e8:$a3: _x_X_PASSWORDLIST_X_x_
      • 0x7330:$a4: L$_RasDefaultCredentials#0
      • 0xa1b4:$a5: \signons1.txt
      C:\Windows\SysWOW64\System\svchost.exeWindows_Trojan_CyberGate_9996d800unknownunknown
      • 0xa3a2:$a1: 24 08 8B 44 24 08 83 C4 14 5D 5F 5E 5B C3 55 8B EC 83 C4 F0
      C:\Windows\SysWOW64\System\svchost.exeRAT_CyberGateDetects CyberGate RATKevin Breen <kevin@techanarchy.net>
      • 0xd781:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd872:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd87f:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd92c:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd939:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd946:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd953:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd960:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd96d:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd97a:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd987:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd994:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd9c0:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd9cd:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd9da:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd81a:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd88c:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd902:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd910:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd91e:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd9fb:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      C:\Windows\SysWOW64\System\svchost.exeCyberGateunknown Kevin Breen <kevin@techanarchy.net>
      • 0xd781:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd872:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd87f:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd92c:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd939:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd946:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd953:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd960:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd96d:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd97a:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd987:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd994:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd9c0:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd9cd:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd9da:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
      • 0xd81a:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd88c:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd902:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd910:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd91e:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      • 0xd9fb:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_CyberGateYara detected CyberGate RATJoe Security
        00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_CyberGate_517aac7dunknownunknown
        • 0xb140:$a1: IELOGIN.abc
        • 0x8ee8:$a2: xxxyyyzzz.dat
        • 0xb0e8:$a3: _x_X_PASSWORDLIST_X_x_
        • 0x6f30:$a4: L$_RasDefaultCredentials#0
        • 0x9db4:$a5: \signons1.txt
        00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_CyberGate_9996d800unknownunknown
        • 0x9fa2:$a1: 24 08 8B 44 24 08 83 C4 14 5D 5F 5E 5B C3 55 8B EC 83 C4 F0
        00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_CyberGate_9996d800unknownunknown
        • 0x2b3ee:$a1: 24 08 8B 44 24 08 83 C4 14 5D 5F 5E 5B C3 55 8B EC 83 C4 F0
        00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CyberGateYara detected CyberGate RATJoe Security
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.0.3ClBcOpPUX.exe.400000.0.unpackJoeSecurity_CyberGateYara detected CyberGate RATJoe Security
            0.0.3ClBcOpPUX.exe.400000.0.unpackWindows_Trojan_CyberGate_517aac7dunknownunknown
            • 0xb540:$a1: IELOGIN.abc
            • 0x92e8:$a2: xxxyyyzzz.dat
            • 0xb4e8:$a3: _x_X_PASSWORDLIST_X_x_
            • 0x7330:$a4: L$_RasDefaultCredentials#0
            • 0xa1b4:$a5: \signons1.txt
            0.0.3ClBcOpPUX.exe.400000.0.unpackWindows_Trojan_CyberGate_9996d800unknownunknown
            • 0xa3a2:$a1: 24 08 8B 44 24 08 83 C4 14 5D 5F 5E 5B C3 55 8B EC 83 C4 F0
            0.0.3ClBcOpPUX.exe.400000.0.unpackRAT_CyberGateDetects CyberGate RATKevin Breen <kevin@techanarchy.net>
            • 0xd781:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd872:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd87f:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd92c:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd939:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd946:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd953:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd960:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd96d:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd97a:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd987:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd994:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd9c0:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd9cd:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd9da:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd81a:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd88c:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd902:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd910:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd91e:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd9fb:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            0.0.3ClBcOpPUX.exe.400000.0.unpackCyberGateunknown Kevin Breen <kevin@techanarchy.net>
            • 0xd781:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd872:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd87f:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd92c:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd939:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd946:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd953:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd960:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd96d:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd97a:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd987:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd994:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd9c0:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd9cd:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd9da:$string1: 23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23
            • 0xd81a:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd88c:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd902:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd910:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd91e:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            • 0xd9fb:$string2: 23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23
            Click to see the 9 entries

            System Summary

            barindex
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\3ClBcOpPUX.exe, ProcessId: 6412, TargetFilename: C:\Windows\SysWOW64\System\svchost.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split), wagga (name): Data: Details: C:\Windows\system32\System\svchost.exe Restart, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\3ClBcOpPUX.exe, ProcessId: 6412, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4C7TF7E-V451-D2XH-Q4F8-64T3431A5V51}\StubPath
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\system32\System\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\3ClBcOpPUX.exe, ProcessId: 6412, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\System\svchost.exe" , CommandLine: "C:\Windows\system32\System\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\System\svchost.exe, NewProcessName: C:\Windows\SysWOW64\System\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\System\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\3ClBcOpPUX.exe", ParentImage: C:\Users\user\Desktop\3ClBcOpPUX.exe, ParentProcessId: 7304, ParentProcessName: 3ClBcOpPUX.exe, ProcessCommandLine: "C:\Windows\system32\System\svchost.exe" , ProcessId: 7532, ProcessName: svchost.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\system32\System\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\3ClBcOpPUX.exe, ProcessId: 6412, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SAQ
            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, ProcessId: 6996, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-14T01:14:14.762003+010028097631Malware Command and Control Activity Detected192.168.2.749985193.161.193.9940214TCP
            2025-01-14T01:14:22.694873+010028097631Malware Command and Control Activity Detected192.168.2.749986193.161.193.9940214TCP
            2025-01-14T01:14:30.679021+010028097631Malware Command and Control Activity Detected192.168.2.749987193.161.193.9940214TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 3ClBcOpPUX.exeAvira: detected
            Source: https://login.liveAvira URL Cloud: Label: malware
            Source: kalintz-40214.portmap.host:40214Avira URL Cloud: Label: malware
            Source: C:\Windows\SysWOW64\System\svchost.exeAvira: detection malicious, Label: TR/Agent.598022
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpackMalware Configuration Extractor: CyberGate {"C2 list": ["kalintz-40214.portmap.host:40214"], "Campaign": "ID", "Password": "123", "InstallFlag": "TRUE", "InstallDir": "System", "InstallFileName": "svchost.exe", "ActiveXStartup": "{B4C7TF7E-V451-D2XH-Q4F8-64T3431A5V51}", "REGKeyHKLM": "SAQ", "REGKeyHKCU": "JSA", "EnableMessageBox": "FALSE", "MessageBoxIcon": "16", "MessageBoxButton": "0", "InstallMessage": "texto da mensagem", "ActivateKeylogger": "TRUE", "KeyloggerBackspace": "TRUE", "KeyloggerEnableFTP": "FALSE", "FTPAddress": "ftp.server.com", "FTPDirectory": "./logs/", "FTPUserName": "ftp_user", "FTPPort": "21", "FTPInterval": "30", "ProcessInjection": "0", "ProcessNameForInjection": "explorer.exe", "Persistance": "TRUE", "HideFile": "TRUE", "ChangeCreationDate": "TRUE", "Mutex": "***MUTEX***", "MeltFile": "FALSE", "CyberGateVersion": "2.6", "StartupPolicies": "Policies", "USBSpread": "FALSE"}
            Source: C:\Windows\SysWOW64\System\svchost.exeReversingLabs: Detection: 97%
            Source: 3ClBcOpPUX.exeVirustotal: Detection: 90%Perma Link
            Source: 3ClBcOpPUX.exeReversingLabs: Detection: 97%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
            Source: C:\Windows\SysWOW64\System\svchost.exeJoe Sandbox ML: detected
            Source: 3ClBcOpPUX.exeJoe Sandbox ML: detected
            Source: 3ClBcOpPUX.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: explorer.exeBinary or memory string: autorun.inf
            Source: explorer.exeBinary or memory string: [autorun] ;open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: explorer.exeBinary or memory string: [autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: H[autorun]
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: 3ClBcOpPUX.exeBinary or memory string: autorun.inf
            Source: 3ClBcOpPUX.exeBinary or memory string: [autorun] ;open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: 3ClBcOpPUX.exeBinary or memory string: [autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: H[autorun]
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240863E8 FindFirstFileA,GetLastError,8_2_240863E8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24086C78 FindFirstFileA,FindClose,8_2_24086C78
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240845F0 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,8_2_240845F0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AD390 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,8_2_240AD390
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24086C77 FindFirstFileA,FindClose,8_2_24086C77
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24085FE2 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,8_2_24085FE2
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24085FE4 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,8_2_24085FE4
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B09E4 FindFirstFileA,FindNextFileA,FindClose,8_2_240B09E4
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F6C78 FindFirstFileA,FindClose,10_2_240F6C78
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F45F0 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,10_2_240F45F0
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411D390 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,10_2_2411D390
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F63E8 FindFirstFileA,GetLastError,10_2_240F63E8
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F6C77 FindFirstFileA,FindClose,10_2_240F6C77
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F5FE4 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,10_2_240F5FE4
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F5FE2 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,10_2_240F5FE2
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_241209E4 FindFirstFileA,FindNextFileA,FindClose,10_2_241209E4
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B092C GetLogicalDriveStringsA,SetErrorMode,GetDriveTypeA,8_2_240B092C
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2809763 - Severity 1 - ETPRO MALWARE Cybergate/Rebhip/Spyrat Backdoor M5 : 192.168.2.7:49986 -> 193.161.193.99:40214
            Source: Network trafficSuricata IDS: 2809763 - Severity 1 - ETPRO MALWARE Cybergate/Rebhip/Spyrat Backdoor M5 : 192.168.2.7:49987 -> 193.161.193.99:40214
            Source: Network trafficSuricata IDS: 2809763 - Severity 1 - ETPRO MALWARE Cybergate/Rebhip/Spyrat Backdoor M5 : 192.168.2.7:49985 -> 193.161.193.99:40214
            Source: Malware configuration extractorURLs: kalintz-40214.portmap.host:40214
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: time.windows.com
            Source: global trafficDNS traffic detected: DNS query: kalintz-40214.portmap.host
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/
            Source: svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS
            Source: svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/ess
            Source: svchost.exe, 0000000F.00000003.1493134780.000002F4FE988000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1493134780.000002F4FE984000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2517335984.000002F4FF087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb
            Source: svchost.exe, 0000000F.00000002.2516793690.000002F4FF040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb:pp
            Source: svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tbA
            Source: svchost.exe, 0000000F.00000003.1542355235.000002F4FF043000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514877018.000002F4FE081000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1456730040.000002F4FF049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb_
            Source: explorer.exe, 00000005.00000003.2277895481.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2275783256.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1270712327.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2520088878.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: svchost.exe, 0000000F.00000002.2515436325.000002F4FE0DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
            Source: explorer.exe, 00000005.00000003.2277895481.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2275783256.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1270712327.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2520088878.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: explorer.exe, 00000005.00000003.2277895481.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2275783256.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1270712327.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2520088878.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD41570.15.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
            Source: svchost.exe, 0000000F.00000003.1361451065.000002F4FF043000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1456730040.000002F4FF049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?ee29c2f
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1446758121.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516012426.000002F4FE900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1447490105.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
            Source: svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd0
            Source: svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAOZ9
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdrypt
            Source: svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdsAAAA
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdx
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1462998793.000002F4FE910000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1461951043.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1524590976.000002F4FE977000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1446758121.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2515543348.000002F4FE0E9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516012426.000002F4FE900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1447490105.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd-cbc
            Source: svchost.exe, 0000000F.00000003.1462230280.000002F4FE929000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAA
            Source: svchost.exe, 0000000F.00000003.1462230280.000002F4FE929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsithm
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdx
            Source: explorer.exe, 00000005.00000003.2277895481.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2275783256.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1270712327.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2520088878.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
            Source: svchost.exe, 0000000F.00000002.2517335984.000002F4FF087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2515543348.000002F4FE0E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://passport.net/tb
            Source: explorer.exe, 00000005.00000002.2522447188.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2520944517.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2522422061.0000000008810000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
            Source: svchost.exe, 0000000F.00000002.2516721060.000002F4FF013000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
            Source: svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc57
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
            Source: svchost.exe, 0000000F.00000003.1493134780.000002F4FE988000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1493134780.000002F4FE984000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee2
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuessue
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
            Source: svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
            Source: svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trustn
            Source: Amcache.hve.14.drString found in binary or memory: http://upx.sf.net
            Source: explorer.exe, 00000005.00000003.2272569777.000000000C41F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274640363.000000000C42C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271443276.000000000C3F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1282672550.000000000C3F7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: svchost.exe, 00000002.00000002.1365149444.0000018999C13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
            Source: explorer.exe, 00000005.00000002.2518815430.00000000071B1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
            Source: svchost.exe, 0000000F.00000003.1511821480.000002F4FE983000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.w3.
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=806014
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80603
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80604
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80605
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
            Source: svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341319930.000002F4FE957000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangcwam
            Source: explorer.exe, 00000005.00000002.2523159601.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2275783256.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
            Source: explorer.exe, 00000005.00000002.2523159601.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274666714.000000000913F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
            Source: explorer.exe, 00000005.00000002.2523159601.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
            Source: explorer.exe, 00000005.00000003.2275783256.0000000008DAD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
            Source: explorer.exe, 00000005.00000003.2275783256.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
            Source: explorer.exe, 00000005.00000002.2518815430.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1270712327.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
            Source: explorer.exe, 00000005.00000003.2275783256.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
            Source: explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
            Source: explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
            Source: svchost.exe, 00000002.00000003.1364474842.0000018999C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365422776.0000018999C70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364324542.0000018999C5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364083180.0000018999C6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 00000002.00000002.1365422776.0000018999C70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364083180.0000018999C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
            Source: svchost.exe, 00000002.00000002.1365395442.0000018999C68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364200029.0000018999C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
            Source: svchost.exe, 00000002.00000003.1364025389.0000018999C75000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365450436.0000018999C77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
            Source: svchost.exe, 00000002.00000003.1364474842.0000018999C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
            Source: svchost.exe, 00000002.00000002.1365395442.0000018999C68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364200029.0000018999C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
            Source: svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
            Source: svchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
            Source: svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
            Source: svchost.exe, 00000002.00000003.1363958641.0000018999C33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
            Source: svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
            Source: svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
            Source: svchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364324542.0000018999C5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
            Source: svchost.exe, 00000002.00000003.1363958641.0000018999C33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
            Source: svchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
            Source: svchost.exe, 00000002.00000002.1365395442.0000018999C68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364200029.0000018999C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
            Source: explorer.exe, 00000005.00000000.1282672550.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2530072847.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
            Source: svchost.exe, 0000000F.00000002.2514451498.000002F4FE039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ignup.as0
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.ecur
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live
            Source: svchost.exe, 0000000F.00000002.2517591491.000002F4FF0AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80600
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80601
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502d=80
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600f?id
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601ppse
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ListSessions.srf
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srfsrf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf
            Source: svchost.exe, 0000000F.00000002.2516721060.000002F4FF013000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2515074606.000002F4FE0A0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srffigS
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/didtou.srf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getrealminfo.srf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getuserrealm.srf
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsec
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srffg:CPAdd
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srflows
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf:CPAddUserI
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srfps://lo
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cpsrf
            Source: svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
            Source: svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
            Source: svchost.exe, 0000000F.00000002.2517143917.000002F4FF07C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-Dpm3u3XT3KTESDAzqdIj6
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srfn.live.
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600UE
            Source: svchost.exe, 0000000F.00000002.2514451498.000002F4FE039000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
            Source: svchost.exe, 0000000F.00000002.2516842694.000002F4FF044000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1542355235.000002F4FF043000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341389723.000002F4FE96B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfSignUpAuth
            Source: svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfm
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502R
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
            Source: svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=806043
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
            Source: svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
            Source: svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341319930.000002F4FE957000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&amp;fid=cp
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341089618.000002F4FE95A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
            Source: svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srfn.sr
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srfLive
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/retention.srf
            Source: svchost.exe, 0000000F.00000002.2515543348.000002F4FE0E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com:443/RST2.srf
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srfm
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJ
            Source: svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
            Source: svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/ResolveUser.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
            Source: svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
            Source: explorer.exe, 00000005.00000000.1282672550.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2530072847.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
            Source: explorer.exe, 00000005.00000000.1282672550.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2530072847.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
            Source: svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://signup.live.com/signup.aspx
            Source: svchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
            Source: svchost.exe, 00000002.00000003.1364549872.0000018999C47000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
            Source: svchost.exe, 00000002.00000003.1364549872.0000018999C47000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
            Source: svchost.exe, 00000002.00000003.1364399286.0000018999C5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
            Source: svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1363958641.0000018999C33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
            Source: svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
            Source: explorer.exe, 00000005.00000003.2274666714.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.00000000090F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
            Source: explorer.exe, 00000005.00000000.1282672550.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2530072847.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
            Source: explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
            Source: explorer.exe, 00000005.00000002.2518815430.00000000071B1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240ACDE0 OpenClipboard,GetClipboardData,DragQueryFile,DragQueryFile,CloseClipboard,8_2_240ACDE0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240ACFC8 OpenClipboard,GlobalAlloc,GlobalLock,SetClipboardData,GlobalUnlock,8_2_240ACFC8
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411CFC8 OpenClipboard,GlobalAlloc,GlobalLock,SetClipboardData,GlobalUnlock,10_2_2411CFC8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240ACDE0 OpenClipboard,GetClipboardData,DragQueryFile,DragQueryFile,CloseClipboard,8_2_240ACDE0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240A7464 GetDesktopWindow,GetDC,CreateCompatibleDC,GetClientRect,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,8_2_240A7464
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C0318 GetKeyboardState,MapVirtualKeyA,ToAscii,8_2_240C0318
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C038C GetAsyncKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,8_2_240C038C
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2413038C GetAsyncKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,10_2_2413038C
            Source: Yara matchFile source: 10.2.3ClBcOpPUX.exe.240f0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.explorer.exe.24080000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2708, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 3ClBcOpPUX.exe PID: 7304, type: MEMORYSTR

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 3ClBcOpPUX.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.3ClBcOpPUX.exe.240f0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.explorer.exe.24080000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 3ClBcOpPUX.exe PID: 6412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2708, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 3ClBcOpPUX.exe PID: 7304, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPED

            System Summary

            barindex
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: Detects CyberGate RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: CyberGate Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: Detects CyberGate/Spyrat/Rebhip RTA Author: ditekSHen
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects CyberGate RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CyberGate Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects CyberGate/Spyrat/Rebhip RTA Author: ditekSHen
            Source: 10.2.3ClBcOpPUX.exe.240f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 10.2.3ClBcOpPUX.exe.240f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 8.2.explorer.exe.24080000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 8.2.explorer.exe.24080000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
            Source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects CyberGate RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: CyberGate Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects CyberGate RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: CyberGate Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: 3ClBcOpPUX.exe PID: 6412, type: MEMORYSTRMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: Detects CyberGate RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: CyberGate Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: Detects CyberGate/Spyrat/Rebhip RTA Author: ditekSHen
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AB690 NtdllDefWindowProc_A,8_2_240AB690
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24085C1C OpenProcess,NtQueryInformationProcess,NtSetInformationProcess,CloseHandle,8_2_24085C1C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AEAA0 SetPropA,GetPropA,NtdllDefWindowProc_A,8_2_240AEAA0
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F5C1C OpenProcess,NtQueryInformationProcess,NtSetInformationProcess,CloseHandle,10_2_240F5C1C
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411B690 NtdllDefWindowProc_A,10_2_2411B690
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411EAA0 SetPropA,GetPropA,NtdllDefWindowProc_A,10_2_2411EAA0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AC950 OpenSCManagerA,OpenServiceA,DeleteService,CloseServiceHandle,CloseServiceHandle,8_2_240AC950
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2408528E ExitWindowsEx,8_2_2408528E
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F528E ExitWindowsEx,10_2_240F528E
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Windows\SysWOW64\System\Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Windows\SysWOW64\System\svchost.exeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Windows\SysWOW64\System\svchost.exe:Zone.Identifier:$DATAJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C61888_2_240C6188
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2409F4148_2_2409F414
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240A34CC8_2_240A34CC
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240A5C248_2_240A5C24
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2409FD448_2_2409FD44
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240A59708_2_240A5970
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2413618810_2_24136188
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2410F41410_2_2410F414
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_241134CC10_2_241134CC
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_24115C2410_2_24115C24
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2410FD4410_2_2410FD44
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411597010_2_24115970
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 2409562C appears 392 times
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 24083480 appears 140 times
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 24085008 appears 57 times
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 240830DC appears 64 times
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 24083388 appears 37 times
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: String function: 2410562C appears 392 times
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: String function: 240F5008 appears 56 times
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: String function: 240F3480 appears 140 times
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: String function: 240F3388 appears 37 times
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: String function: 240F30DC appears 64 times
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 7532 -ip 7532
            Source: 3ClBcOpPUX.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: RAT_CyberGate date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects CyberGate RAT, reference = http://malwareconfig.com/stats/CyberGate
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: CyberGate date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/CyberGate
            Source: 3ClBcOpPUX.exe, type: SAMPLEMatched rule: MALWARE_Win_CyberGate author = ditekSHen, description = Detects CyberGate/Spyrat/Rebhip RTA
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_CyberGate date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects CyberGate RAT, reference = http://malwareconfig.com/stats/CyberGate
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CyberGate date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/CyberGate
            Source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CyberGate author = ditekSHen, description = Detects CyberGate/Spyrat/Rebhip RTA
            Source: 10.2.3ClBcOpPUX.exe.240f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 10.2.3ClBcOpPUX.exe.240f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 8.2.explorer.exe.24080000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 8.2.explorer.exe.24080000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
            Source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_CyberGate date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects CyberGate RAT, reference = http://malwareconfig.com/stats/CyberGate
            Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: CyberGate date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/CyberGate
            Source: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_CyberGate date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects CyberGate RAT, reference = http://malwareconfig.com/stats/CyberGate
            Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: CyberGate date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/CyberGate
            Source: Process Memory Space: 3ClBcOpPUX.exe PID: 6412, type: MEMORYSTRMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: RAT_CyberGate date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects CyberGate RAT, reference = http://malwareconfig.com/stats/CyberGate
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: CyberGate date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/CyberGate
            Source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_CyberGate author = ditekSHen, description = Detects CyberGate/Spyrat/Rebhip RTA
            Source: classification engineClassification label: mal100.troj.evad.winEXE@22/16@2/0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AC424 GetVersionExA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,CloseHandle,8_2_240AC424
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24085B30 GetVersionExA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,CloseHandle,8_2_24085B30
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F5B30 GetVersionExA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,CloseHandle,10_2_240F5B30
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411C424 GetVersionExA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,CloseHandle,10_2_2411C424
            Source: C:\Windows\SysWOW64\explorer.exeCode function: OpenSCManagerA,CreateServiceA,CloseServiceHandle,CloseServiceHandle,8_2_240ACBE4
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: OpenSCManagerA,CreateServiceA,CloseServiceHandle,CloseServiceHandle,10_2_2411CBE4
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AC858 OpenSCManagerA,OpenServiceA,StartServiceA,ControlService,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,8_2_240AC858
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Users\user\AppData\Roaming\logs.datJump to behavior
            Source: C:\Windows\SysWOW64\System\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\_x_X_UPDATE_X_x_
            Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\***MUTEX***_SAIR
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMutant created: \Sessions\1\BaseNamedObjects\***MUTEX***
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMutant created: \Sessions\1\BaseNamedObjects\_x_X_BLOCKMOUSE_X_x_
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:7584:64:WilError_03
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMutant created: \Sessions\1\BaseNamedObjects\_x_X_PASSWORDLIST_X_x_
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7532
            Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\***MUTEX***_PERSIST
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5172:120:WilError_03
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Users\user~1\AppData\Local\Temp\XX--XX--XX.txtJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 3ClBcOpPUX.exeVirustotal: Detection: 90%
            Source: 3ClBcOpPUX.exeReversingLabs: Detection: 97%
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile read: C:\Users\user\Desktop\3ClBcOpPUX.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\3ClBcOpPUX.exe "C:\Users\user\Desktop\3ClBcOpPUX.exe"
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exe
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Users\user\Desktop\3ClBcOpPUX.exe "C:\Users\user\Desktop\3ClBcOpPUX.exe"
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\System\svchost.exe "C:\Windows\system32\System\svchost.exe"
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 7532 -ip 7532
            Source: C:\Windows\SysWOW64\System\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 564
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Users\user\Desktop\3ClBcOpPUX.exe "C:\Users\user\Desktop\3ClBcOpPUX.exe"Jump to behavior
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\System\svchost.exe "C:\Windows\system32\System\svchost.exe" Jump to behavior
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 7532 -ip 7532Jump to behavior
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 564Jump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: wscinterop.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: wscapi.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: werconcpl.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: wer.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: hcproviders.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: ndfapi.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: wdi.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: duser.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: twext.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: starttiledata.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: acppage.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: msi.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: aepic.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\System\svchost.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\System\svchost.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Windows\SysWOW64\System\svchost.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\System\svchost.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\System\svchost.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\System\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wlidsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gamestreamingext.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msauserext.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: tbs.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptnet.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptngc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptprov.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: elscore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: elstrans.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24086EDC LoadLibraryA,GetProcAddress,GetTempPathA,8_2_24086EDC
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24094408 push 24094440h; ret 8_2_24094438
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240A6400 push 240A642Ch; ret 8_2_240A6424
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B0430 push 240B0468h; ret 8_2_240B0460
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2409545C push 24095488h; ret 8_2_24095480
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2409A450 push 2409A47Ch; ret 8_2_2409A474
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C346C push 240C3498h; ret 8_2_240C3490
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B046C push 240B04A0h; ret 8_2_240B0498
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24095494 push 240954C0h; ret 8_2_240954B8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C34A4 push 240C34D0h; ret 8_2_240C34C8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AB4CC push 240AB4F8h; ret 8_2_240AB4F0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C34F4 push 240C3520h; ret 8_2_240C3518
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24092518 push 24092544h; ret 8_2_2409253C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B1514 push 240B1540h; ret 8_2_240B1538
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2408552C push 24085558h; ret 8_2_24085550
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24095544 push 24095570h; ret 8_2_24095568
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C2550 push 240C25CFh; ret 8_2_240C25C7
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240A6554 push 240A6580h; ret 8_2_240A6578
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2409557C push 240955A8h; ret 8_2_240955A0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24080608 push cs; iretd 8_2_2408060B
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24092600 push 2409262Ch; ret 8_2_24092624
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AC62C push 240AC658h; ret 8_2_240AC650
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AC6AC push 240AC6D8h; ret 8_2_240AC6D0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240956A0 push 240956CCh; ret 8_2_240956C4
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240936DC push ecx; mov dword ptr [esp], edx8_2_240936DE
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AB7A0 push 240AB7CCh; ret 8_2_240AB7C4
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2408F7F8 push 2408F824h; ret 8_2_2408F81C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240937F0 push 2409381Ch; ret 8_2_24093814
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24092010 push 2409203Ch; ret 8_2_24092034
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240A606C push 240A6098h; ret 8_2_240A6090
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AE070 push 240AE0A8h; ret 8_2_240AE0A0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24092080 push 240920ACh; ret 8_2_240920A4

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Windows\SysWOW64\System\svchost.exeJump to dropped file
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeExecutable created and started: C:\Windows\SysWOW64\System\svchost.exeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Windows\SysWOW64\System\svchost.exeJump to dropped file
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile created: C:\Windows\SysWOW64\System\svchost.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run JSAJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run PoliciesJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4C7TF7E-V451-D2XH-Q4F8-64T3431A5V51} StubPathJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4C7TF7E-V451-D2XH-Q4F8-64T3431A5V51} StubPathJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4C7TF7E-V451-D2XH-Q4F8-64T3431A5V51} StubPathJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4C7TF7E-V451-D2XH-Q4F8-64T3431A5V51} StubPathJump to behavior
            Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\ConfigJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AC858 OpenSCManagerA,OpenServiceA,StartServiceA,ControlService,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,8_2_240AC858
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run SAQJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run SAQJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run JSAJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run JSAJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24085564 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_24085564
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_8-17324
            Source: C:\Windows\SysWOW64\explorer.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_8-17025
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_10-17124
            Source: 3ClBcOpPUX.exe, svchost.exe.0.drBinary or memory string: SBIEDLL.DLLS3
            Source: 3ClBcOpPUX.exe, svchost.exe.0.drBinary or memory string: SBIEDLL.DLL
            Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: OpenSCManagerA,EnumServicesStatusA,CloseServiceHandle,8_2_240AC9E0
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: OpenSCManagerA,EnumServicesStatusA,CloseServiceHandle,10_2_2411C9E0
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 1800000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 648Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeWindow / User API: threadDelayed 2258Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeWindow / User API: foregroundWindowGot 1425Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_10-16743
            Source: C:\Windows\SysWOW64\explorer.exeAPI coverage: 9.1 %
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7240Thread sleep time: -110000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7232Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7192Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7200Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 3232Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7208Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7216Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7224Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 1352Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7184Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 2020Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 3452Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 6420Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 1412Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 6912Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 7176Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exe TID: 2172Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7488Thread sleep time: -28800000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7500Thread sleep time: -40000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7440Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7448Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7456Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7352Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7416Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7424Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7360Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7376Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7432Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7368Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7312Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7392Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7400Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7344Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exe TID: 7408Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240863E8 FindFirstFileA,GetLastError,8_2_240863E8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24086C78 FindFirstFileA,FindClose,8_2_24086C78
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240845F0 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,8_2_240845F0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AD390 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,8_2_240AD390
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24086C77 FindFirstFileA,FindClose,8_2_24086C77
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24085FE2 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,8_2_24085FE2
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24085FE4 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,8_2_24085FE4
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B09E4 FindFirstFileA,FindNextFileA,FindClose,8_2_240B09E4
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F6C78 FindFirstFileA,FindClose,10_2_240F6C78
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F45F0 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,10_2_240F45F0
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411D390 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,10_2_2411D390
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F63E8 FindFirstFileA,GetLastError,10_2_240F63E8
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F6C77 FindFirstFileA,FindClose,10_2_240F6C77
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F5FE4 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,10_2_240F5FE4
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_240F5FE2 FindFirstFileA,FindNextFileA,FindClose,RemoveDirectoryA,10_2_240F5FE2
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_241209E4 FindFirstFileA,FindNextFileA,FindClose,10_2_241209E4
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B092C GetLogicalDriveStringsA,SetErrorMode,GetDriveTypeA,8_2_240B092C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2408F870 GetVersionExW,GetVersionExW,GetSystemInfo,GetSystemMetrics,8_2_2408F870
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 1800000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
            Source: Amcache.hve.14.drBinary or memory string: VMware
            Source: explorer.exe, 00000005.00000002.2512612138.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
            Source: explorer.exe, 00000005.00000002.2523159601.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
            Source: svchost.exe.0.drBinary or memory string: VBoxService.exeS3
            Source: svchost.exe, 00000004.00000002.2514052060.000001F53405E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
            Source: Amcache.hve.14.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: svchost.exe, 00000004.00000002.2513853139.000001F53402B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: explorer.exe, 00000005.00000003.2275783256.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2515436325.000002F4FE0DC000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514451498.000002F4FE039000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: svchost.exe, 00000004.00000002.2514481625.000001F534089000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000002.2515704586.0000000003230000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
            Source: Amcache.hve.14.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.14.drBinary or memory string: vmci.sys
            Source: explorer.exe, 00000005.00000002.2523159601.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
            Source: svchost.exe, 00000004.00000002.2514052060.000001F53404B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000002.2523159601.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
            Source: explorer.exe, 00000005.00000000.1279085771.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
            Source: explorer.exe, 00000005.00000000.1279085771.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
            Source: Amcache.hve.14.drBinary or memory string: VMware20,1
            Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.14.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.14.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.14.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.14.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: explorer.exe, 00000005.00000002.2520088878.000000000730B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: explorer.exe, 00000005.00000002.2523159601.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2275783256.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
            Source: Amcache.hve.14.drBinary or memory string: VMware VMCI Bus Device
            Source: explorer.exe, 00000005.00000002.2515704586.0000000003230000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
            Source: Amcache.hve.14.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.14.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.14.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
            Source: explorer.exe, 00000005.00000002.2523159601.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000002.2512612138.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.14.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.14.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.14.drBinary or memory string: VMware, Inc.
            Source: svchost.exe, 00000004.00000002.2514304342.000001F53407C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.14.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.14.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.14.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.14.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: explorer.exe, 00000005.00000002.2515704586.0000000003230000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
            Source: svchost.exe, 00000004.00000002.2513853139.000001F53402B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000002.2523159601.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
            Source: explorer.exe, 00000005.00000002.2515704586.0000000003230000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: Amcache.hve.14.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: explorer.exe, 00000005.00000002.2520088878.000000000730B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
            Source: Amcache.hve.14.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: explorer.exe, 00000008.00000002.2512837875.0000000002BD6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2513069759.00000218BCA2B000.00000004.00000020.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2512975944.0000000000932000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: svchost.exe.0.drBinary or memory string: VBoxService.exe
            Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.14.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.14.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: svchost.exe, 00000004.00000002.2514304342.000001F534064000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000e1}
            Source: explorer.exe, 00000005.00000003.2275783256.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
            Source: svchost.exe, 0000000F.00000002.2516721060.000002F4FF013000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTVMWare
            Source: explorer.exe, 00000005.00000002.2515704586.0000000003230000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
            Source: svchost.exe, 00000004.00000002.2513484850.000001F534002000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
            Source: explorer.exe, 00000005.00000002.2523159601.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
            Source: Amcache.hve.14.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: explorer.exe, 00000005.00000002.2523159601.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
            Source: svchost.exe, 00000004.00000002.2514052060.000001F53404B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000002.2512612138.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: C:\Windows\SysWOW64\explorer.exeAPI call chain: ExitProcess graph end nodegraph_8-17112
            Source: C:\Windows\SysWOW64\explorer.exeAPI call chain: ExitProcess graph end nodegraph_8-16637
            Source: C:\Windows\SysWOW64\explorer.exeAPI call chain: ExitProcess graph end nodegraph_8-16702
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeAPI call chain: ExitProcess graph end nodegraph_10-16224
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeAPI call chain: ExitProcess graph end nodegraph_10-18654
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeAPI call chain: ExitProcess graph end nodegraph_10-16298
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: NTICE
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeFile opened: SICE
            Source: C:\Windows\SysWOW64\System\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24086EDC LoadLibraryA,GetProcAddress,GetTempPathA,8_2_24086EDC
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2409E130 WSAStartup,GetProcessHeap,WSACleanup,8_2_2409E130
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 24010000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8510000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 7C30000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 7C60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 85B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 85C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8850000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8860000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8870000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8B10000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8B30000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8B40000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 8B50000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 9750000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 97F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 9800000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: B060000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: B190000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BF40000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BF50000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BF60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BF70000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BF80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BF90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BFA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: BFB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E2B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E2C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E2D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E2E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E2F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E300000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E310000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E320000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E330000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E340000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E350000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E360000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E580000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E590000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E5A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E5B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E5C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E5D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E5E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E5F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E600000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E610000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E620000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: E630000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F240000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F250000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F260000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F270000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F280000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F290000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F2A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F2B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F2C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F2D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F2E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F2F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F300000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F320000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: F330000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10410000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10420000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10430000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10440000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10450000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10460000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10470000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10480000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10490000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 104A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 104B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 104C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 104D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 104E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 104F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10500000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10510000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10520000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10530000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10540000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10550000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10560000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10570000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10580000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10590000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 105A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 105B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 105C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 105D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 105E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 105F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10600000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10610000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10620000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10630000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10640000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10650000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10660000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10670000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10680000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10690000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 106A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 106B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 106C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 106D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 106E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 106F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10700000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10710000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10720000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10730000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10740000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10750000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10760000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10770000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10780000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10790000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 107A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 107B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 107C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 107D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 107E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 107F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10800000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\explorer.exe base: 10810000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 24080000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 500000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 510000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 520000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 530000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A10000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A20000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A30000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A40000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A50000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A70000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2A90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2AA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2AB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2E90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2EA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2EB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2EC0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2ED0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2EE0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2EF0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2F00000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2F10000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2F20000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2F30000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2F40000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2F50000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2F60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 47A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 47B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 47C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 47D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4820000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4830000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4840000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 48C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 48E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 48F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4900000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4990000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 49A0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 49B0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 49C0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 49D0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 49E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 49F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4A80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4A90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4AA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4AB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4AC0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4AD0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4AE0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4B70000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4B80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4B90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4BA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4BB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4BC0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4BD0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4C60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4C70000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4C80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4C90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4CA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4CB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4CC0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4D10000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4D70000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4D80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4D90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4DA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4DB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4DC0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4E50000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4E60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4E70000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4E80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4E90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4EA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4EB0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4F40000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4F50000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4F60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4F70000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4F80000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4F90000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 4FA0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5030000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5040000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5050000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5060000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5070000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5080000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5090000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5120000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5130000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5140000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5150000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5160000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5170000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5180000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5210000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5220000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5230000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5240000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5250000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5260000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5270000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5300000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5310000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5320000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5330000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5340000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5350000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5360000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 53F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5410000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5420000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5430000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5440000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5450000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 54E0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 54F0000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5500000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5510000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5520000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 5530000 protect: page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240C4984 CreateProcessA,GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,SetThreadContext,TerminateProcess,ResumeThread,8_2_240C4984
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AB354 GetModuleHandleA,VirtualFreeEx,VirtualAllocEx,GetModuleHandleA,WriteProcessMemory,CreateRemoteThread,CloseHandle,8_2_240AB354
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: 10_2_2411B354 GetModuleHandleA,VirtualFreeEx,VirtualAllocEx,GetModuleHandleA,WriteProcessMemory,CreateRemoteThread,CloseHandle,10_2_2411B354
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 520000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 2A30000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 2A70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 2AB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 2EC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 2F00000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 2F30000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 47A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 47D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 48C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4900000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 49C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 49F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4AB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4AE0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4BA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4BD0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4C90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4CC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4D90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4DC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4E80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4EB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4F70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 4FA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5060000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5090000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5150000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5180000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5240000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5270000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5330000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5360000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5420000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5450000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5510000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeThread created: C:\Windows\SysWOW64\explorer.exe EIP: 5530000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 24010000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 24080000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Users\user\Desktop\3ClBcOpPUX.exe base: 240F0000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8510000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 7C30000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 7C60000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 85B0000 value: 4CJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 85C0000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8850000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8860000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8870000 value: 47Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8B10000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8B30000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8B40000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 8B50000 value: 56Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 9750000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 97F0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 9800000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: B060000 value: 56Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: B190000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BF40000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BF50000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BF60000 value: 56Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BF70000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BF80000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BF90000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BFA0000 value: 61Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: BFB0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E2B0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E2C0000 value: 52Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E2D0000 value: 61Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E2E0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E2F0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E300000 value: 41Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E310000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E320000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E330000 value: 63Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E340000 value: 41Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E350000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E360000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E580000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E590000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E5A0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E5B0000 value: 42Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E5C0000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E5D0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E5E0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E5F0000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E600000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E610000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E620000 value: 47Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: E630000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F240000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F250000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F260000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F270000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F280000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F290000 value: 57Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F2A0000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F2B0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F2C0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F2D0000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F2E0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F2F0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F300000 value: 61Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F320000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: F330000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10400000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10410000 value: 6EJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10420000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10430000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10440000 value: 5AJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10450000 value: 6EJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10460000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10470000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10480000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10490000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 104A0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 104B0000 value: 43Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 104C0000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 104D0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 104E0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 104F0000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10500000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10510000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10520000 value: 53Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10530000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10540000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10550000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10560000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10570000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10580000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10590000 value: 53Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 105A0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 105B0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 105C0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 105D0000 value: 73Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 105E0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 105F0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10600000 value: 53Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10610000 value: 73Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10620000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10630000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10640000 value: 75Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10650000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10660000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10670000 value: 47Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10680000 value: 75Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10690000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 106A0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 106B0000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 106C0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 106D0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 106E0000 value: 46Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 106F0000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10700000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10710000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10720000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10730000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10740000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10750000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10760000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10770000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10780000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10790000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 107A0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 107B0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 107C0000 value: 73Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 107D0000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 107E0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 107F0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 24010000 value: 4DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10800000 value: 00Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 4056 base: 10810000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 500000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 510000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 520000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 530000 value: 4CJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A10000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A20000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A30000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A40000 value: 47Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A50000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A60000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A70000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A80000 value: 56Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2A90000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2AA0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2AB0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2E90000 value: 56Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2EA0000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2EB0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2EC0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2ED0000 value: 56Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2EE0000 value: 4BJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2EF0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2F00000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2F10000 value: 61Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2F20000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2F30000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2F40000 value: 52Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2F50000 value: 61Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 2F60000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 47A0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 47B0000 value: 41Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 47C0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 47D0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4820000 value: 63Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4830000 value: 41Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4840000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 48C0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 48E0000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 48F0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4900000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4990000 value: 42Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 49A0000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 49B0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 49C0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 49D0000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 49E0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 49F0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4A80000 value: 47Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4A90000 value: 67Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4AA0000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4AB0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4AC0000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4AD0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4AE0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4B70000 value: 57Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4B80000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4B90000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4BA0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4BB0000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4BC0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4BD0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4C60000 value: 61Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4C70000 value: 6DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4C80000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4C90000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4CA0000 value: 6EJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4CB0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4CC0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4D10000 value: 5AJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4D70000 value: 6EJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4D80000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4D90000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4DA0000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4DB0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4DC0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4E50000 value: 43Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4E60000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4E70000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4E80000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4E90000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4EA0000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4EB0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4F40000 value: 53Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4F50000 value: 6FJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4F60000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4F70000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4F80000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4F90000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 4FA0000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5030000 value: 53Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5040000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5050000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5060000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5070000 value: 73Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5080000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5090000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5120000 value: 53Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5130000 value: 73Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5140000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5150000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5160000 value: 75Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5170000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5180000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5210000 value: 47Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5220000 value: 75Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5230000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5240000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5250000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5260000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5270000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5300000 value: 46Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5310000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5320000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5330000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5340000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5350000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5360000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 53F0000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5400000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5410000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5420000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5430000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5440000 value: D0Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5450000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 54E0000 value: 73Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 54F0000 value: 77Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5500000 value: 70Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5510000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 24080000 value: 4DJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5520000 value: 00Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: PID: 2708 base: 5530000 value: 55Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8510000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 7C30000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 7C60000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 85B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 85C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8850000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8860000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8870000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8B10000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8B30000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8B40000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 8B50000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 9750000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 97F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 9800000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: B060000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: B190000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BF40000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BF50000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BF60000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BF70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BF80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BF90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BFA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: BFB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E2B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E2C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E2D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E2E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E2F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E300000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E310000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E320000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E330000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E340000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E350000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E360000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E580000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E590000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E5A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E5B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E5C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E5D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E5E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E5F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E600000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E610000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E620000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: E630000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F240000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F250000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F260000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F270000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F280000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F290000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F2A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F2B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F2C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F2D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F2E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F2F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F300000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F320000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: F330000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10400000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10410000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10420000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10430000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10440000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10450000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10460000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10470000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10480000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10490000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 104A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 104B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 104C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 104D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 104E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 104F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10500000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10510000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10520000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10530000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10540000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10550000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10560000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10570000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10580000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10590000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 105A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 105B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 105C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 105D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 105E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 105F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10600000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10610000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10620000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10630000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10640000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10650000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10660000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10670000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10680000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10690000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 106A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 106B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 106C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 106D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 106E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 106F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10700000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10710000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10720000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10730000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10740000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10750000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10760000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10770000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10780000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10790000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 107A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 107B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 107C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 107D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 107E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 107F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 24010000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10800000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\explorer.exe base: 10810000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 500000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 510000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 520000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 530000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A10000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A20000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A30000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A40000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A50000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A60000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2A90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2AA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2AB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2E90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2EA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2EB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2EC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2ED0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2EE0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2EF0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2F00000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2F10000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2F20000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2F30000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2F40000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2F50000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2F60000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 47A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 47B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 47C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 47D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4820000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4830000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4840000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 48C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 48E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 48F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4900000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4990000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49A0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49B0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49C0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49D0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 49F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4A80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4A90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4AA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4AB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4AC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4AD0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4AE0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4B70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4B80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4B90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4BA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4BB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4BC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4BD0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4C60000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4C70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4C80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4C90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4CA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4CB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4CC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4D10000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4D70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4D80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4D90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4DA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4DB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4DC0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E50000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E60000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4EA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4EB0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4F40000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4F50000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4F60000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4F70000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4F80000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4F90000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4FA0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5030000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5040000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5050000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5060000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5070000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5080000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5090000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5120000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5130000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5140000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5150000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5160000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5170000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5180000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5210000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5220000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5230000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5240000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5250000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5260000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5270000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5300000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5310000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5320000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5330000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5340000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5350000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5360000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 53F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5400000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5410000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5420000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5430000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5440000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5450000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 54E0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 54F0000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5500000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5510000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 24080000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5520000Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 5530000Jump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240B4968 keybd_event,keybd_event,8_2_240B4968
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_2408544E mouse_event,8_2_2408544E
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\explorer.exe explorer.exeJump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Users\user\Desktop\3ClBcOpPUX.exe "C:\Users\user\Desktop\3ClBcOpPUX.exe"Jump to behavior
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeProcess created: C:\Windows\SysWOW64\System\svchost.exe "C:\Windows\system32\System\svchost.exe" Jump to behavior
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 7532 -ip 7532Jump to behavior
            Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 564Jump to behavior
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerer.
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers6+);
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2518626694.00000000066B3000.00000004.00000020.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519440741.0000000006799000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: explorer.exe, explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: ProgMan
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerll
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers6+
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerE2
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: deskicoblockProgMan
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerer7
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers6+)
            Source: explorer.exe, 00000005.00000002.2514833375.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1268566634.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: ProgManS
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2512975944.0000000000932000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [ Program Manager ] ---> [ DATE/TIME: 18/01/2025 -- 17:04 ]
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519440741.0000000006799000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerHCG
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519440741.0000000006799000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager C/
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519440741.0000000006799000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager$C+
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: 4shell_traywnd
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndTrayNotifyWndSysPagerjh
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager_
            Source: 3ClBcOpPUX.exe, svchost.exe.0.drBinary or memory string: Shell_TrayWndU
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers6b
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndSV
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers6
            Source: 3ClBcOpPUX.exe, svchost.exe.0.drBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000005.00000002.2514833375.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1268566634.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerer
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerP
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519440741.0000000006799000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager|Cs
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagererZ
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerL
            Source: explorer.exe, 00000005.00000002.2512612138.0000000000C59000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1268258520.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
            Source: 3ClBcOpPUX.exe, svchost.exe.0.drBinary or memory string: explorer.exeexplorer.exeshell_traywndopenU
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerx
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2512975944.0000000000932000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [ Program Manager ] ---> [ DATE/TIME: 14/01/2025 -- 22:12 ]
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2519440741.0000000006799000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerpC
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerv
            Source: explorer.exe, 00000005.00000002.2514833375.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1268566634.0000000001441000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:wi
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndTrayNotifyWndSysPagerS
            Source: explorer.exe, 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, 3ClBcOpPUX.exe, 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: btnstartblockButtonShell_TrayWnd
            Source: 3ClBcOpPUX.exe, svchost.exe.0.drBinary or memory string: _PERSISTShell_TrayWndexplorer.exeU
            Source: 3ClBcOpPUX.exe, svchost.exe.0.drBinary or memory string: shell_traywnd
            Source: 3ClBcOpPUX.exe, 0000000A.00000002.2517015484.00000000045D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,8_2_240847A8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetLocaleInfoA,8_2_24088CD0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetKeyboardLayoutNameA,GetLocaleInfoA,GetLocaleInfoA,8_2_24088DE0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: GetLocaleInfoA,8_2_24088F80
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,10_2_240F47A8
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: GetLocaleInfoA,10_2_240F8CD0
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: GetKeyboardLayoutNameA,GetLocaleInfoA,GetLocaleInfoA,10_2_240F8DE0
            Source: C:\Users\user\Desktop\3ClBcOpPUX.exeCode function: GetLocaleInfoA,10_2_240F8F80
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_24081644 GetSystemTime,8_2_24081644
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240917EC GetUserNameA,8_2_240917EC
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 8_2_240AC424 GetVersionExA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,CloseHandle,8_2_240AC424

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46} STATEJump to behavior
            Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.14.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.14.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: svchost.exe, 00000007.00000002.2514960815.0000014C30D02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Files%\Windows Defender\MsMpeng.exe
            Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: svchost.exe, 00000007.00000002.2514960815.0000014C30D02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: Amcache.hve.14.drBinary or memory string: MsMpEng.exe
            Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 3ClBcOpPUX.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.3ClBcOpPUX.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.3ClBcOpPUX.exe.240f0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.explorer.exe.24080000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 3ClBcOpPUX.exe PID: 6412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2708, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 3ClBcOpPUX.exe PID: 7304, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\SysWOW64\System\svchost.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Replication Through Removable Media
            1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            21
            Input Capture
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts12
            Native API
            22
            Windows Service
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Peripheral Device Discovery
            Remote Desktop Protocol1
            Screen Capture
            1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts12
            Service Execution
            21
            Registry Run Keys / Startup Folder
            22
            Windows Service
            2
            Obfuscated Files or Information
            Security Account Manager1
            Account Discovery
            SMB/Windows Admin Shares21
            Input Capture
            11
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook712
            Process Injection
            1
            DLL Side-Loading
            NTDS1
            System Service Discovery
            Distributed Component Object Model3
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Registry Run Keys / Startup Folder
            221
            Masquerading
            LSA Secrets4
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts61
            Virtualization/Sandbox Evasion
            Cached Domain Credentials35
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync271
            Security Software Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job712
            Process Injection
            Proc Filesystem2
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow61
            Virtualization/Sandbox Evasion
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            Application Window Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
            System Owner/User Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590401 Sample: 3ClBcOpPUX.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 41 kalintz-40214.portmap.host 2->41 43 time.windows.com 2->43 45 bg.microsoft.map.fastly.net 2->45 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 9 other signatures 2->53 9 3ClBcOpPUX.exe 5 4 2->9         started        13 svchost.exe 2->13         started        15 svchost.exe 8 2->15         started        17 5 other processes 2->17 signatures3 process4 file5 37 C:\Windows\SysWOW64\System\svchost.exe, PE32 9->37 dropped 39 C:\Windows\...\svchost.exe:Zone.Identifier, ASCII 9->39 dropped 65 Found evasive API chain (may stop execution after checking mutex) 9->65 67 Creates an undocumented autostart registry key 9->67 69 Contains functionality to inject threads in other processes 9->69 73 7 other signatures 9->73 19 3ClBcOpPUX.exe 2 407 9->19         started        22 explorer.exe 9->22         started        24 explorer.exe 35 2 9->24 injected 71 Changes security center settings (notifications, updates, antivirus, firewall) 13->71 26 MpCmdRun.exe 2 13->26         started        28 WerFault.exe 2 15->28         started        signatures6 process7 signatures8 55 Drops executables to the windows directory (C:\Windows) and starts them 19->55 30 svchost.exe 8 19->30         started        57 Found evasive API chain (may stop execution after checking mutex) 22->57 59 Creates an undocumented autostart registry key 22->59 61 Contains functionality to inject threads in other processes 22->61 63 Contains functionality to inject code into remote processes 22->63 33 conhost.exe 26->33         started        process9 signatures10 75 Antivirus detection for dropped file 30->75 77 Multi AV Scanner detection for dropped file 30->77 79 Machine Learning detection for dropped file 30->79 35 WerFault.exe 21 16 30->35         started        process11

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            3ClBcOpPUX.exe90%VirustotalBrowse
            3ClBcOpPUX.exe97%ReversingLabsWin32.Backdoor.Spyrat
            3ClBcOpPUX.exe100%AviraTR/Agent.598022
            3ClBcOpPUX.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\SysWOW64\System\svchost.exe100%AviraTR/Agent.598022
            C:\Windows\SysWOW64\System\svchost.exe100%Joe Sandbox ML
            C:\Windows\SysWOW64\System\svchost.exe97%ReversingLabsWin32.Backdoor.Spyrat
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ignup.as00%Avira URL Cloudsafe
            https://login.live100%Avira URL Cloudmalware
            https://login.ecur0%Avira URL Cloudsafe
            kalintz-40214.portmap.host:40214100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.210.172
            truefalse
              high
              kalintz-40214.portmap.host
              193.161.193.99
              truetrue
                unknown
                time.windows.com
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  kalintz-40214.portmap.host:40214true
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://Passport.NET/esssvchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000002.00000002.1365395442.0000018999C68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364200029.0000018999C67000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://api.msn.com:443/v1/news/Feed/Windows?texplorer.exe, 00000005.00000002.2518815430.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1270712327.0000000007276000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-worldexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winterexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd0svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/02/sc57svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://excel.office.comexplorer.exe, 00000005.00000000.1282672550.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2530072847.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          https://login.microsoftonline.com/ppsecure/ResolveUser.srfsvchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://Passport.NET/tbAsvchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000002.00000003.1364474842.0000018999C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365422776.0000018999C70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364324542.0000018999C5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364083180.0000018999C6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuesvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ignup.as0svchost.exe, 0000000F.00000002.2514451498.000002F4FE039000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://login.microsoftonline.com/ppsecure/devicechangecredential.srfsvchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&ocexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          https://login.microsoftonline.com/ppsecure/EnumerateDevices.srfsvchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://wns.windows.com/explorer.exe, 00000005.00000003.2274666714.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.00000000090F2000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAOZ9svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://account.live.com/InlineSignup.aspx?iww=1&id=80502svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.bingmapsportal.comsvchost.exe, 00000002.00000002.1365149444.0000018999C13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000002.00000003.1364474842.0000018999C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://Passport.NET/tb_svchost.exe, 0000000F.00000003.1542355235.000002F4FF043000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514877018.000002F4FE081000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1456730040.000002F4FF049000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://login.livesvchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000005.00000003.2272569777.000000000C41F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274640363.000000000C42C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271443276.000000000C3F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1282672550.000000000C3F7000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://word.office.comexplorer.exe, 00000005.00000000.1282672550.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2530072847.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000002.00000003.1364399286.0000018999C5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000002.00000002.1365395442.0000018999C68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364200029.0000018999C67000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJsvchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://account.live.com/msangcwamsvchost.exe, 0000000F.00000003.1341599713.000002F4FE92A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341319930.000002F4FE957000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364324542.0000018999C5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://crl.ver)svchost.exe, 0000000F.00000002.2515436325.000002F4FE0DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdxsvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://passport.net/tbsvchost.exe, 0000000F.00000002.2517335984.000002F4FF087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2515543348.000002F4FE0E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000002.00000003.1364549872.0000018999C47000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365257506.0000018999C42000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trust/Issueuesvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/svchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfsvchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdxsvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://outlook.comexplorer.exe, 00000005.00000000.1282672550.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2530072847.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://dynamic.tsvchost.exe, 00000002.00000003.1363958641.0000018999C33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://android.notify.windows.com/iOSexplorer.exe, 00000005.00000002.2523159601.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274666714.000000000913F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAsvchost.exe, 0000000F.00000003.1462230280.000002F4FE929000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuesvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000005.00000002.2523159601.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2275783256.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F83000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                http://schemas.xmlsoap.org/ws/2005/02/trust/Issuessuesvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000002.00000002.1365366318.0000018999C63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364224835.0000018999C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://login.ecursvchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                    unknown
                                                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trustnsvchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://account.live.com/Wizard/Password/Change?id=806014svchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000002.00000002.1365422776.0000018999C70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364083180.0000018999C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000002.00000003.1363958641.0000018999C33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000005.00000003.2275783256.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1279085771.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2523159601.0000000008F09000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actuaexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://www.pollensense.com/explorer.exe, 00000005.00000002.2518815430.00000000071B1000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000002.00000003.1364511700.0000018999C41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfsvchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAsvchost.exe, 0000000F.00000003.1462230280.000002F4FE929000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsvchost.exe, 0000000F.00000003.1341291721.000002F4FE93B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341367006.000002F4FE963000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              http://schemas.xmlsoap.org/soap/envelope/svchost.exe, 0000000F.00000002.2516721060.000002F4FF013000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                http://schemas.xmlsoap.org/ws/2005/02/trustsvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/viexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-bexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      http://schemas.microexplorer.exe, 00000005.00000002.2522447188.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2520944517.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2522422061.0000000008810000.00000002.00000001.00040000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsithmsvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://login.microsoftonline.com/MSARST2.srfsvchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            http://Passport.NET/STSsvchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000002.00000003.1364589405.0000018999C57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365308250.0000018999C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINtexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1363958641.0000018999C33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      http://www.w3.svchost.exe, 0000000F.00000003.1511821480.000002F4FE983000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        http://Passport.NET/svchost.exe, 0000000F.00000002.2514755975.000002F4FE05E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-explorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdsAAAAsvchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 00000005.00000000.1270712327.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2518815430.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee2svchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      http://Passport.NET/tbsvchost.exe, 0000000F.00000003.1493134780.000002F4FE988000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1493134780.000002F4FE984000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2517335984.000002F4FF087000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516278622.000002F4FE937000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsvchost.exe, 0000000F.00000002.2516367199.000002F4FE95F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1462998793.000002F4FE910000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1480462698.000002F4FE976000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1461951043.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1524590976.000002F4FE977000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1364411043.000002F4FE952000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1446758121.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2515543348.000002F4FE0E9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2516012426.000002F4FE900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1447490105.000002F4FE90E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsdsvchost.exe, 0000000F.00000002.2516436879.000002F4FE97F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                            high
                                                                                                                                                                                                            https://signup.live.com/signup.aspxsvchost.exe, 0000000F.00000003.1341344444.000002F4FE940000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE955000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2514652718.000002F4FE040000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                              high
                                                                                                                                                                                                              https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000002.00000002.1365395442.0000018999C68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1365193517.0000018999C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1364200029.0000018999C67000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                high
                                                                                                                                                                                                                https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601svchost.exe, 0000000F.00000003.1341477740.000002F4FE956000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.1341126013.000002F4FE952000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                  high
                                                                                                                                                                                                                  No contacted IP infos
                                                                                                                                                                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                                                                                                                                                                  Analysis ID:1590401
                                                                                                                                                                                                                  Start date and time:2025-01-14 01:11:06 +01:00
                                                                                                                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                  Overall analysis duration:0h 6m 37s
                                                                                                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                  Report type:full
                                                                                                                                                                                                                  Cookbook file name:default.jbs
                                                                                                                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                  Number of analysed new started processes analysed:19
                                                                                                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                                                                                                  Number of injected processes analysed:1
                                                                                                                                                                                                                  Technologies:
                                                                                                                                                                                                                  • HCA enabled
                                                                                                                                                                                                                  • EGA enabled
                                                                                                                                                                                                                  • AMSI enabled
                                                                                                                                                                                                                  Analysis Mode:default
                                                                                                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                                                                                                  Sample name:3ClBcOpPUX.exe
                                                                                                                                                                                                                  renamed because original name is a hash value
                                                                                                                                                                                                                  Original Sample Name:aed92a8301931959100a1bb8c52251df2fdddaf8b76ab34b6f24d7bbe58a4fe6.exe
                                                                                                                                                                                                                  Detection:MAL
                                                                                                                                                                                                                  Classification:mal100.troj.evad.winEXE@22/16@2/0
                                                                                                                                                                                                                  EGA Information:
                                                                                                                                                                                                                  • Successful, ratio: 66.7%
                                                                                                                                                                                                                  HCA Information:
                                                                                                                                                                                                                  • Successful, ratio: 96%
                                                                                                                                                                                                                  • Number of executed functions: 97
                                                                                                                                                                                                                  • Number of non-executed functions: 204
                                                                                                                                                                                                                  Cookbook Comments:
                                                                                                                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                                                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe
                                                                                                                                                                                                                  • Excluded IPs from analysis (whitelisted): 20.101.57.9, 40.126.31.71, 20.190.159.4, 20.190.159.73, 20.190.159.2, 20.190.159.64, 20.190.159.68, 20.190.159.71, 20.190.159.75, 199.232.210.172, 52.168.117.173, 13.107.246.45, 20.12.23.50
                                                                                                                                                                                                                  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, prdv4a.aadg.msidentity.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, twc.trafficmanager.net, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                                                                                                                                                                  • Execution Graph export aborted for target 3ClBcOpPUX.exe, PID 6412 because there are no executed function
                                                                                                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                                                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                                                                                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                                  TimeTypeDescription
                                                                                                                                                                                                                  01:12:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run JSA C:\Windows\system32\System\svchost.exe
                                                                                                                                                                                                                  01:12:14AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SAQ C:\Windows\system32\System\svchost.exe
                                                                                                                                                                                                                  03:12:18AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run JSA C:\Windows\system32\System\svchost.exe
                                                                                                                                                                                                                  19:12:07API Interceptor2894888x Sleep call for process: 3ClBcOpPUX.exe modified
                                                                                                                                                                                                                  19:12:18API Interceptor854x Sleep call for process: explorer.exe modified
                                                                                                                                                                                                                  21:12:14API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                                                                                                                                  21:12:47API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                                                                                                                                                  No context
                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                  bg.microsoft.map.fastly.net40#U0433.docGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  • 199.232.214.172
                                                                                                                                                                                                                  KymUijfvKi.docGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  Rev5_ Joint Declaration C5 GER_track changes.docGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  RoYAd85faz.docGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  40#U0433.docGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  RoYAd85faz.docGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  • 199.232.214.172
                                                                                                                                                                                                                  3.19.1+SetupWIService.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  JUbmpeT.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  Invoice and packing list.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  AstralprivateDLL.exe.bin.exeGet hashmaliciousDCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                                                                                                                                                  • 199.232.210.172
                                                                                                                                                                                                                  No context
                                                                                                                                                                                                                  No context
                                                                                                                                                                                                                  No context
                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):65536
                                                                                                                                                                                                                  Entropy (8bit):0.7789841380022714
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:96:bFFs1Ky3As7hhp7MfGQXIDcQvc6QcEVcw3cE/OhI+HbHg/8BRTf3+kEcIh8dNRgP:xaQ8AH0BU/AjJg3xzuiF9Z24IO8U
                                                                                                                                                                                                                  MD5:20718C696A7F435D898DBE21BEB76645
                                                                                                                                                                                                                  SHA1:1DE08BDEBBAD548932DA3B371421F3824564E056
                                                                                                                                                                                                                  SHA-256:35845DC5B6113FEBF39C603F27A2558F4D9E5F512D3C63A1E115CC1EE17AC2FB
                                                                                                                                                                                                                  SHA-512:B8566BF26F5BFFDC9ED6136CAF4E8B4A85F745471E069E3C9FE08C7F8B3F763B941F2B017D4A7C621CA3AAA58A407491F90DCEBD38370F43F9743777EDB9005F
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.2.8.7.1.2.9.3.0.6.3.5.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.2.8.7.1.2.9.7.4.3.8.6.9.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.3.f.2.0.c.c.-.f.c.e.f.-.4.c.f.7.-.a.f.6.3.-.2.f.c.7.3.9.8.c.0.d.8.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.e.2.b.f.e.a.f.-.0.2.7.b.-.4.d.7.b.-.8.1.f.2.-.8.8.1.1.8.e.c.0.9.9.b.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.c.-.0.0.0.1.-.0.0.1.4.-.f.e.3.4.-.7.8.f.3.1.8.6.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.2.c.e.3.3.1.5.f.f.a.f.9.9.8.d.5.3.b.f.a.c.f.0.c.c.4.c.6.4.a.0.0.0.0.0.f.f.f.f.!.0.0.0.0.2.c.e.a.7.1.8.7.4.e.7.3.5.a.b.2.3.b.2.5.8.0.b.0.3.e.0.a.f.a.d.b.b.a.d.f.0.b.d.4.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.
                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  File Type:Mini DuMP crash report, 14 streams, Tue Jan 14 00:12:09 2025, 0x1205a4 type
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):37802
                                                                                                                                                                                                                  Entropy (8bit):1.9862533692226305
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:192:mbXu8G/kGbOLb4iJCg6jTMyQl9g6J0Fg8HIMHclEg2:nFkTLv66UbDe
                                                                                                                                                                                                                  MD5:CB69057ADB3C3392F733F419F0A9D951
                                                                                                                                                                                                                  SHA1:C93AB831B479699FAE3B3EB0D087C8ECE5394C61
                                                                                                                                                                                                                  SHA-256:F191906D46B8B190E6FDA80C909A62DE9DA42544E9205678EA95835F940CD35D
                                                                                                                                                                                                                  SHA-512:051DE0D4334C3A07AABA3DE58300D25B120167B1DDE7FB9FD21BF10A1D8B447A54DC34A36A520659D7F07EBD9110258C615945308657ACF3FCF88258A1C00672
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:MDMP..a..... .........g........................h................#..........T.......8...........T................|......................................................................................................eJ..............GenuineIntel............T.......l.....g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):8262
                                                                                                                                                                                                                  Entropy (8bit):3.6921810286929966
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:192:R6l7wVeJE26r6Y+nM6WFgmfN/prt89bJfsfVjm:R6lXJt6r6Y96EgmfN4JEfc
                                                                                                                                                                                                                  MD5:F7B55CBFC02E4A08BA1287177A39C46B
                                                                                                                                                                                                                  SHA1:A1397AC55EB1D5433A2D1BEF1673E65EEE515ADB
                                                                                                                                                                                                                  SHA-256:972A595B9877B57FB6F0F1E4EF4120E59E697481056476B7300870899B0D7CB7
                                                                                                                                                                                                                  SHA-512:8477BC88F225082EA50FD9126216253CA0D0912B1199F894DCA76D9134149A54CD23A6C718FECF01405191C7218D2C44F12DF22BD8966F95C436EE1CEBC56D66
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.3.2.<./.P.i.
                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):4558
                                                                                                                                                                                                                  Entropy (8bit):4.4320058788722605
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:48:cvIwWl8zsSJg77aI9VyWpW8VYx5Ym8M4JCXuFg+q8gF33v+DHMd:uIjfgI7XT7V7JCbHnkHMd
                                                                                                                                                                                                                  MD5:D98D166489FEA3E065D77025554B78CB
                                                                                                                                                                                                                  SHA1:ADB25DA346D75B0C751D59C19BB7A956077FDA30
                                                                                                                                                                                                                  SHA-256:D32F077A3CB923E1F59FA9295E7FB7F758D10BDF80F59CD384258DE03DC20B5A
                                                                                                                                                                                                                  SHA-512:8245CBCCCD91CE3933CD06C5191E6319AADE17845FB18787FA0377E69EBA5B2F57FCF5AED23BECF628EC03C1F896F0471F9CD3071949E8772ACB8AE6F4AC63BD
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="674834" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):79250
                                                                                                                                                                                                                  Entropy (8bit):3.049590637428848
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:768:ACgpp7dRr6wkRgYsxG8kmeqOMPh6eWlPa217jjXLbQAy:APp3rjkRgYsx6COMPh6ZlPd1PjXL0Ay
                                                                                                                                                                                                                  MD5:33D6D91B276A999DCC935D2E8DF6EEF3
                                                                                                                                                                                                                  SHA1:BFE11EA9E758CABEE9511235CE63CCCD443CD26E
                                                                                                                                                                                                                  SHA-256:309074DE0B473A2BAD9F15444700D674694C63958B0C07EF45C6BEBB410F4B75
                                                                                                                                                                                                                  SHA-512:3C7EBA265569044308889E382BF49A9938F50BE7D12B76D1D62F09232D0B28A0E8AFE0129F551B44C7240C48BDC320E332A3031B580CC9D275E6B0A36B18E025
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):13340
                                                                                                                                                                                                                  Entropy (8bit):2.6856058749085805
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:96:TiZYW/i5wBlfoYCDYzWTHHmYEZfRtEifVAwuw4TbQabOhMYwdI/ry3:2ZD/2VDxg+HQabOhMYwi/G3
                                                                                                                                                                                                                  MD5:10A0396F290C63CBB6CE9D2D86DCBACA
                                                                                                                                                                                                                  SHA1:DDCBE0E095A4A00344BB7FDB3ABDF8AF9B49527E
                                                                                                                                                                                                                  SHA-256:3C6D4DEB81C406247E475DC0540179153125EB46218CED1C2714B8A9F35772C6
                                                                                                                                                                                                                  SHA-512:E00903A2D54268596E464A05140594F3DC9C48AD23051209DEEDCFC321D6053F252A23A6A929309CFB2A248507D86E9520ACAD6D8F4038991F1B8106C4B74CC4
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4761 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):4761
                                                                                                                                                                                                                  Entropy (8bit):7.945585251880973
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:96:6ZUpZsm0HwZ8FLSeXs+aiL9qcZ7KtlAD1GlNHgdkVI5F11AcNmwkVFzGz6ENhZC7:62T0QOLl8vAqcZ7K3AUNAdx5FAx9VEOj
                                                                                                                                                                                                                  MD5:77B20B5CD41BC6BB475CCA3F91AE6E3C
                                                                                                                                                                                                                  SHA1:9E98ACE72BD2AB931341427A856EF4CEA6FAF806
                                                                                                                                                                                                                  SHA-256:5511A9B9F9144ED7BDE4CCB074733B7C564D918D2A8B10D391AFC6BE5B3B1509
                                                                                                                                                                                                                  SHA-512:3537DA5E7F3ABA3DAFE6A86E9511ABA20B7A3D34F30AEA6CC11FEEF7768BD63C0C85679C49E99C3291BD1B552DED2C6973B6C2F7F6D731BCFACECAB218E72FD4
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:MSCF............,...................O..................YWP .disallowedcert.stl.lJ..B...CK.wTS.....{.&Uz.I."E".HS@. .P.!.....*E. .DQ..... EDA.H. E..""/.s<.s.9.....&#.{~k.VV..7@......b.R....MdT..B.L..%.C......" ....%.4%..%*.B..T.d...S.....pem..$....&.q.`.+...E..C.....$.|.A.!~d.H>w%S$...QC't..;..<..R@....2. .l..?..c..A....Ew...l..K$.. ~...'......Mt^c..s.Y%..}......h......m....h.......~d...,...=ge3.....2%..(...T..!].....!C~.X..MHU.o[.z].Y...&lXG;uW.:...2!..][\/.G..]6#.I...S..#F.X.k.j.....)Nc.].t^.-l.Y...4?.b...rY....A......7.D.H\.R...s.L,.6.*|.....VQ....<.*.......... [Z....].N0LU.X........6..C\....F.....KbZ..^=.@.B..MyH...%.2.>...]..E.....sZ.f..3z.].Y.t.d$.....P...,. .~..mNZ[PL.<....d..+...l.-...b.^....6F..z.&.;D.._..c."...d..... k9....60?&..Y.v.dgu...{.....{..d=..$......@^..qA..*uJ..@W.V..eC..AV.e+21...N.{.]..]..f]..`Z.....]2.....x..f..K...t. ...e.V.U.$PV..@6W\_nsm.n.........A<.......d....@f..Z... >R..k.....8..Y....E>..2o7..........c..K7n....
                                                                                                                                                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                  Category:modified
                                                                                                                                                                                                                  Size (bytes):340
                                                                                                                                                                                                                  Entropy (8bit):3.2507060390371376
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:6:kKtT5+7DNfUN+SkQlPlEGYRMY9z+s3Ql2DUeXJlOW1:VMLkPlE99SCQl2DUeXJlOA
                                                                                                                                                                                                                  MD5:6A91B9A3D168F49DE64FB686F67D9A61
                                                                                                                                                                                                                  SHA1:A78EBA042CDF10B195A85B6C2098E5B8B8CF294C
                                                                                                                                                                                                                  SHA-256:B519545803EDD8981A049E1FC35CF8C0163E1D55FA6851CDE32262158EA21F35
                                                                                                                                                                                                                  SHA-512:9F67E24F92CD5022EF7DB0B608F65578668D93CF478F5EB535CAF900F98715F734F09B1EBDFA8654C7E5F338C572B9FF7DD178289F73D1DBC81A4B2AE14FFB66
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:p...... ........``C..f..(....................................................... ........~..MG......&.....6.........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".0.6.c.f.c.c.5.4.d.4.7.d.b.1.:.0."...
                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):8
                                                                                                                                                                                                                  Entropy (8bit):2.25
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:Mf53:MR
                                                                                                                                                                                                                  MD5:86396A44E457CACABE57B4F5017C3846
                                                                                                                                                                                                                  SHA1:4D6E3BB1FBA487E23C9ADD0125A51211135E0A6E
                                                                                                                                                                                                                  SHA-256:502A4F6D9EBFCC15C0EC5C4EAD12DB75B27ED7EEC533C700EBC7B43B4AEBF78C
                                                                                                                                                                                                                  SHA-512:1FFDF754B46FB7C64304DF5E230FBA946F26F6A74EBA517C904D0A784698DE091E973B4EBF9221C7A0B0BC06ABB0F2C9FD627442079C24E20E700FFBCBF1C127
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:10:33:08
                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                  Category:modified
                                                                                                                                                                                                                  Size (bytes):235393
                                                                                                                                                                                                                  Entropy (8bit):7.963225516788606
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3072:oiP5JuXLFG3Oa95BrKUqEQ94jhc3PQuPe2D2ue3NXR0jW/UCFnp7HBIJJyCwFiCT:f5JGmrpQsK3RD2u270jupCJsCxCT
                                                                                                                                                                                                                  MD5:C68383F0EFD1112CD0A52915818AFCF7
                                                                                                                                                                                                                  SHA1:393F192D83B5F1EEE18AE4EDCDF56DEBE8821302
                                                                                                                                                                                                                  SHA-256:1662E9DE80AAE9270A40E7F80F26732DC16376E669D8FB7FFD0CC7AC1D0D984A
                                                                                                                                                                                                                  SHA-512:4B207B1975DE31D4282B1EC393E55B5BDC8075469BB367EDD05A97D6D116EA590E36A7C4893EE484308F0591418D4AEF1F415AC4F2EE03049809EB852FC285FD
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:C:\Users\user\Desktop\3ClBcOpPUX.exe|C:\Windows\system32\System\svchost.exe|.............................####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@####..####@####...####@####....####@####.####@####..............####@####......####@####..........####@####...............................####@####...####@####...####@####.....####@####..####@####.####@####.Q..............####@####...............####@####....####@####....####@####.....####@####............####@####......####@#### ####@####........####@####.&Kj..b####@####..####@####..####@####.....####@####.....####@####.....####@####....####@####....####@####....####@####....####@####....####@####....####@####....####@####....####@####....####@####.####@####...........####@####....####@####....####@####....####@####.........####@####.....####@####............
                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                                                                                                                  Category:modified
                                                                                                                                                                                                                  Size (bytes):8
                                                                                                                                                                                                                  Entropy (8bit):2.5
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:MfqRc:MP
                                                                                                                                                                                                                  MD5:28EC79CF8431BA0EEA2EF3FFED0882FE
                                                                                                                                                                                                                  SHA1:D9EC83611ABFC9B2DA66C1BA52C973E08B93DFBB
                                                                                                                                                                                                                  SHA-256:8411CE45394DACB87714A4D8ABB8E69ADFF215BE6171B0A9E4773D4CBBBD1AC5
                                                                                                                                                                                                                  SHA-512:B2B07C4C0A6AE5E54DCC504922ECB2A0ADEC817B278000D62E3EE991EBA9D5FA4E1264601F2CB6ED54011E94BD5E9DEAF06CE9C09BB974FC09810D7400984015
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:10:43:49
                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):185
                                                                                                                                                                                                                  Entropy (8bit):5.480652901743442
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:WhqgGRQPehFrcfRr+6b0Z6RXwQ5mMIJZovGgQPehFrcfRr+6X0Z6RzTovx5mMIJc:W4gVPehWfRrP4cyQ5mJJZokPehWfRrPA
                                                                                                                                                                                                                  MD5:23184B76889BDBA5B6097D281F9CC037
                                                                                                                                                                                                                  SHA1:9D7FA38F94969F22EBBF65E894EBE15C4E90DEE3
                                                                                                                                                                                                                  SHA-256:85014D347B251EB75835DAEFF89C028831BDF59EC97BED5D31FEB74FC164246E
                                                                                                                                                                                                                  SHA-512:64FE5E1E467C3225028CFC5D7806585AB86261B403FA25C1F60C4E33EAB9EFE7E77D1D8CF3D559DD43AD48A17F50C96976E8B15B859BEDB33686A21F0F9DB797
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:ufDQcGGKk..####u*{DJIYO[*hCMECIS+s6+);4+}$wjbk%..hk1.'>*22+6<3>.;+$$81763v....>iKMZ6yQCQP-,!....####u*{DJIYO[*hCMECIS+s6+);4+}$wjbk%..hk1.'2*22+6<3>.;+$'=1603v....>iKMZ6yQCQP-,!....####
                                                                                                                                                                                                                  Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                  Category:modified
                                                                                                                                                                                                                  Size (bytes):2464
                                                                                                                                                                                                                  Entropy (8bit):3.2492648148111805
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:24:QOaqdmuF3rL4+kWReHgHttUKlDENh+pyMySn6tUKlDENh+pyMySwwIPVxcwIPVx9:FaqdF7L4+AAHdKoqKFxcxkFZu
                                                                                                                                                                                                                  MD5:01760F1F7BCE9E3C19760633EB313794
                                                                                                                                                                                                                  SHA1:AC9867BD048DEE12998FDD217DA8DFD972A57EA4
                                                                                                                                                                                                                  SHA-256:68B58C9721C83D1F31581EB25EB8D5C0A99184D0C651FBDD7C147417BDCB8BB8
                                                                                                                                                                                                                  SHA-512:8DA8DF6D658E478E791B058657C373893A73F0340E552C9959C934DCC67B1377762159B5BD69789F32BF5973E788C2EA38DEE27DB90EB0BB0AA84E9D9460096C
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. M.o.n. .. J.a.n. .. 1.3. .. 2.0.2.5. .2.1.:.1.2.:.4.7.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):290304
                                                                                                                                                                                                                  Entropy (8bit):7.857458421691476
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:6144:jmcD66RRjf5JGmrpQsK3RD2u270jupCJsCxCC:acD663eZ2zkPaCx5
                                                                                                                                                                                                                  MD5:77515669C23C08469A95333A8D43BE63
                                                                                                                                                                                                                  SHA1:2CEA71874E735AB23B2580B03E0AFADBBADF0BD4
                                                                                                                                                                                                                  SHA-256:AED92A8301931959100A1BB8C52251DF2FDDDAF8B76AB34B6F24D7BBE58A4FE6
                                                                                                                                                                                                                  SHA-512:9B10AE0C4B02512B9F0E9B35FB5B1A5A323545BE80C241E01519A4781F24F50609CCC2158E63E09C59C2820DE9E37E06301C12509E9133FF4F62976293860304
                                                                                                                                                                                                                  Malicious:true
                                                                                                                                                                                                                  Yara Hits:
                                                                                                                                                                                                                  • Rule: JoeSecurity_CyberGate, Description: Yara detected CyberGate RAT, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: Joe Security
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_517aac7d, Description: unknown, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: unknown
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: unknown
                                                                                                                                                                                                                  • Rule: RAT_CyberGate, Description: Detects CyberGate RAT, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  • Rule: CyberGate, Description: unknown, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  • Rule: MALWARE_Win_CyberGate, Description: Detects CyberGate/Spyrat/Rebhip RTA, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: ditekSHen
                                                                                                                                                                                                                  Antivirus:
                                                                                                                                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                                                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                                                                  • Antivirus: ReversingLabs, Detection: 97%
                                                                                                                                                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...................................@.......................0..`............................ ......................................................CODE............................... ..`DATA.... ...........................@...BSS......................................idata..............................@....tls.....................................rdata....... ......................@..P.reloc..`....0......................@..P.rsrc........@......................@..P.............P......................@..P........................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):26
                                                                                                                                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                                                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                                                                                                  Malicious:true
                                                                                                                                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):1835008
                                                                                                                                                                                                                  Entropy (8bit):4.416627836501753
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:6144:zcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNW5+T:oi58oSWIZBk2MM6AFBwoT
                                                                                                                                                                                                                  MD5:A05A9010841638FB41F38B63B5A0E996
                                                                                                                                                                                                                  SHA1:A286D5A97021E4924589E4B13F98DAFC1D83AC3F
                                                                                                                                                                                                                  SHA-256:43CE83B9C9D8ADD94A86E2FE27DED1AB16C0DD427DF81A75104FBC17CBEA8EEA
                                                                                                                                                                                                                  SHA-512:7E5C2509DE8C029856DD26E3CDABE2FEA23E9412747E9223B3812FCCEF3A67626D01147CD9343F5167CE58FDEEF2CA2C861162A02D518161B97872A264606992
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm2...f...............................................................................................................................................................................................................................................................................................................................................n..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                  Entropy (8bit):7.857458421691476
                                                                                                                                                                                                                  TrID:
                                                                                                                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                                                                                                                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                  File name:3ClBcOpPUX.exe
                                                                                                                                                                                                                  File size:290'304 bytes
                                                                                                                                                                                                                  MD5:77515669c23c08469a95333a8d43be63
                                                                                                                                                                                                                  SHA1:2cea71874e735ab23b2580b03e0afadbbadf0bd4
                                                                                                                                                                                                                  SHA256:aed92a8301931959100a1bb8c52251df2fdddaf8b76ab34b6f24d7bbe58a4fe6
                                                                                                                                                                                                                  SHA512:9b10ae0c4b02512b9f0e9b35fb5b1a5a323545be80c241e01519a4781f24f50609ccc2158e63e09c59c2820de9e37e06301c12509e9133ff4f62976293860304
                                                                                                                                                                                                                  SSDEEP:6144:jmcD66RRjf5JGmrpQsK3RD2u270jupCJsCxCC:acD663eZ2zkPaCx5
                                                                                                                                                                                                                  TLSH:F754F1A6B6C4C6BAC2B40EFC5C28C1A439ADB9323E7714A7F6DD0F4D593D092690D183
                                                                                                                                                                                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                                                                                                                                  Icon Hash:00928e8e8686b000
                                                                                                                                                                                                                  Entrypoint:0x40bbf4
                                                                                                                                                                                                                  Entrypoint Section:CODE
                                                                                                                                                                                                                  Digitally signed:false
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  Subsystem:windows gui
                                                                                                                                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                                                                                                                                                  DLL Characteristics:
                                                                                                                                                                                                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                                                                                                                                                  TLS Callbacks:
                                                                                                                                                                                                                  CLR (.Net) Version:
                                                                                                                                                                                                                  OS Version Major:4
                                                                                                                                                                                                                  OS Version Minor:0
                                                                                                                                                                                                                  File Version Major:4
                                                                                                                                                                                                                  File Version Minor:0
                                                                                                                                                                                                                  Subsystem Version Major:4
                                                                                                                                                                                                                  Subsystem Version Minor:0
                                                                                                                                                                                                                  Import Hash:078683deeee217bf8224debb163055d6
                                                                                                                                                                                                                  Instruction
                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                  mov ecx, 0000000Bh
                                                                                                                                                                                                                  push 00000000h
                                                                                                                                                                                                                  push 00000000h
                                                                                                                                                                                                                  dec ecx
                                                                                                                                                                                                                  jne 00007F71111C4DBBh
                                                                                                                                                                                                                  push ebx
                                                                                                                                                                                                                  mov eax, 0040BB04h
                                                                                                                                                                                                                  call 00007F71111BC5CFh
                                                                                                                                                                                                                  xor eax, eax
                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                  push 0040C0C4h
                                                                                                                                                                                                                  push dword ptr fs:[eax]
                                                                                                                                                                                                                  mov dword ptr fs:[eax], esp
                                                                                                                                                                                                                  push 0040C0D4h
                                                                                                                                                                                                                  push 00000000h
                                                                                                                                                                                                                  push 00000000h
                                                                                                                                                                                                                  call 00007F71111BC703h
                                                                                                                                                                                                                  mov ebx, eax
                                                                                                                                                                                                                  call 00007F71111BC784h
                                                                                                                                                                                                                  cmp eax, 000000B7h
                                                                                                                                                                                                                  jne 00007F71111C4DD4h
                                                                                                                                                                                                                  push ebx
                                                                                                                                                                                                                  call 00007F71111BC6BFh
                                                                                                                                                                                                                  push 00002EE0h
                                                                                                                                                                                                                  call 00007F71111BC7F5h
                                                                                                                                                                                                                  jmp 00007F71111C4DC8h
                                                                                                                                                                                                                  push ebx
                                                                                                                                                                                                                  call 00007F71111BC6ADh
                                                                                                                                                                                                                  push 0040C0E8h
                                                                                                                                                                                                                  push 00000000h
                                                                                                                                                                                                                  push 00000000h
                                                                                                                                                                                                                  call 00007F71111BC6CFh
                                                                                                                                                                                                                  mov ebx, eax
                                                                                                                                                                                                                  call 00007F71111BC750h
                                                                                                                                                                                                                  cmp eax, 000000B7h
                                                                                                                                                                                                                  jne 00007F71111C4FF0h
                                                                                                                                                                                                                  push ebx
                                                                                                                                                                                                                  call 00007F71111BC687h
                                                                                                                                                                                                                  lea eax, dword ptr [ebp-14h]
                                                                                                                                                                                                                  call 00007F71111C2C1Bh
                                                                                                                                                                                                                  mov edx, dword ptr [ebp-14h]
                                                                                                                                                                                                                  mov eax, 0040F1ECh
                                                                                                                                                                                                                  call 00007F71111BAC4Eh
                                                                                                                                                                                                                  cmp dword ptr [0040F1ECh], 00000000h
                                                                                                                                                                                                                  je 00007F71111C4DF1h
                                                                                                                                                                                                                  mov eax, dword ptr [0040F1ECh]
                                                                                                                                                                                                                  call 00007F71111BAE77h
                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                  lea eax, dword ptr [ebp-18h]
                                                                                                                                                                                                                  call 00007F71111BF126h
                                                                                                                                                                                                                  lea eax, dword ptr [ebp-18h]
                                                                                                                                                                                                                  mov edx, 0040C108h
                                                                                                                                                                                                                  call 00007F71111BAE69h
                                                                                                                                                                                                                  mov eax, dword ptr [ebp-18h]
                                                                                                                                                                                                                  mov edx, dword ptr [0040F1ECh]
                                                                                                                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x100000xbe4.idata
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x399bc.rsrc
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x130000xa60.reloc
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x120000x18.rdata
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                  CODE0x10000xb1c80xb2004a2150bf37c4ff6bbd8f4f2c3a09b096False0.5470066713483146data6.41418124966198IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  DATA0xd0000x2200x400dd653175899ceecf929eb6d19ce189b4False0.2685546875data2.7642577357404954IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                  BSS0xe0000x11f10x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                  .idata0x100000xbe40xc004f982c9b59dc3fc83ad5a7c9912faa66False0.4296875data4.770955685378527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                  .tls0x110000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                  .rdata0x120000x180x200a270a5e1f4f71f9ddb31027f913842a2False0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "A"0.20544562813451883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  .reloc0x130000xa600xc00ba51f7deda6128aa3417cb4fe1f7eb61False0.751953125data6.245900512684813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  .rsrc0x140000x399bc0x39a00d415ea625552dd0d91d60004efc89112False0.9749525488069414data7.963350386550714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                  RT_RCDATA0x140f80x10data1.5
                                                                                                                                                                                                                  RT_RCDATA0x141080x184data0.7938144329896907
                                                                                                                                                                                                                  RT_RCDATA0x1428c0x39730data0.9758108383762834
                                                                                                                                                                                                                  DLLImport
                                                                                                                                                                                                                  kernel32.dllGetCurrentThreadId, WideCharToMultiByte, MultiByteToWideChar, ExitProcess, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetCommandLineA, TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA, GetModuleFileNameA, FreeLibrary, HeapFree, HeapReAlloc, HeapAlloc, GetProcessHeap
                                                                                                                                                                                                                  user32.dllCharNextA
                                                                                                                                                                                                                  oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                                                                                                                                                                  advapi32.dllRegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegEnumValueA, RegDeleteKeyA, RegCreateKeyExA, RegCreateKeyA, RegCloseKey, OpenProcessToken, LookupAccountNameA, IsValidSid, GetUserNameA
                                                                                                                                                                                                                  kernel32.dlllstrlenA, lstrcmpiA, WriteProcessMemory, WriteFile, WaitForSingleObject, VirtualProtectEx, VirtualProtect, VirtualFreeEx, VirtualFree, VirtualAllocEx, VirtualAlloc, Sleep, SizeofResource, SetFilePointer, SetFileAttributesA, ReadProcessMemory, ReadFile, OpenProcess, LockResource, LoadResource, LoadLibraryA, GlobalFree, GetVersionExA, GetTickCount, GetProcAddress, GetPrivateProfileStringA, GetPrivateProfileIntA, GetModuleHandleA, GetLastError, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetCurrentProcess, FreeResource, FreeLibrary, FindResourceA, FindFirstFileA, FindClose, ExitProcess, DeleteFileA, CreateRemoteThread, CreateProcessA, CreateMutexA, CreateFileA, CreateDirectoryA, CopyFileA, CloseHandle
                                                                                                                                                                                                                  user32.dllwvsprintfA, TranslateMessage, ToAscii, SetWindowsHookExA, PeekMessageA, GetWindowThreadProcessId, GetKeyboardState, FindWindowA, DispatchMessageA, CharLowerA, CharUpperA
                                                                                                                                                                                                                  ole32.dllOleInitialize, CoCreateInstance
                                                                                                                                                                                                                  ole32.dllCoTaskMemFree
                                                                                                                                                                                                                  pstorec.dllPStoreCreateInstance
                                                                                                                                                                                                                  ole32.dllStringFromCLSID
                                                                                                                                                                                                                  rasapi32.dllRasGetEntryDialParamsA, RasEnumEntriesA
                                                                                                                                                                                                                  shell32.dllSHGetSpecialFolderPathA
                                                                                                                                                                                                                  advapi32.dllLsaFreeMemory, LsaClose, LsaRetrievePrivateData, LsaOpenPolicy, ConvertSidToStringSidA
                                                                                                                                                                                                                  crypt32.dllCryptUnprotectData
                                                                                                                                                                                                                  advapi32.dllCredEnumerateA
                                                                                                                                                                                                                  advapi32.dllCryptDestroyHash, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextA
                                                                                                                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                                  2025-01-14T01:14:14.762003+01002809763ETPRO MALWARE Cybergate/Rebhip/Spyrat Backdoor M51192.168.2.749985193.161.193.9940214TCP
                                                                                                                                                                                                                  2025-01-14T01:14:22.694873+01002809763ETPRO MALWARE Cybergate/Rebhip/Spyrat Backdoor M51192.168.2.749986193.161.193.9940214TCP
                                                                                                                                                                                                                  2025-01-14T01:14:30.679021+01002809763ETPRO MALWARE Cybergate/Rebhip/Spyrat Backdoor M51192.168.2.749987193.161.193.9940214TCP
                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                  Jan 14, 2025 01:12:07.510587931 CET5308753192.168.2.71.1.1.1
                                                                                                                                                                                                                  Jan 14, 2025 01:14:14.683231115 CET5018753192.168.2.71.1.1.1
                                                                                                                                                                                                                  Jan 14, 2025 01:14:14.702224970 CET53501871.1.1.1192.168.2.7
                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                  Jan 14, 2025 01:12:07.510587931 CET192.168.2.71.1.1.10x910Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Jan 14, 2025 01:14:14.683231115 CET192.168.2.71.1.1.10xc16aStandard query (0)kalintz-40214.portmap.hostA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                  Jan 14, 2025 01:12:07.517467022 CET1.1.1.1192.168.2.70x910No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Jan 14, 2025 01:12:11.924717903 CET1.1.1.1192.168.2.70xa5cbNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Jan 14, 2025 01:12:11.924717903 CET1.1.1.1192.168.2.70xa5cbNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Jan 14, 2025 01:12:56.252504110 CET1.1.1.1192.168.2.70x5690No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Jan 14, 2025 01:12:56.252504110 CET1.1.1.1192.168.2.70x5690No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Jan 14, 2025 01:14:14.702224970 CET1.1.1.1192.168.2.70xc16aNo error (0)kalintz-40214.portmap.host193.161.193.99A (IP address)IN (0x0001)false

                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                  Target ID:0
                                                                                                                                                                                                                  Start time:19:12:01
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:"C:\Users\user\Desktop\3ClBcOpPUX.exe"
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:290'304 bytes
                                                                                                                                                                                                                  MD5 hash:77515669C23C08469A95333A8D43BE63
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Yara matches:
                                                                                                                                                                                                                  • Rule: JoeSecurity_CyberGate, Description: Yara detected CyberGate RAT, Source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_517aac7d, Description: unknown, Source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: 00000000.00000000.1254230385.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:2
                                                                                                                                                                                                                  Start time:19:12:02
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                                                                                                                                                  Imagebase:0x7ff7b4ee0000
                                                                                                                                                                                                                  File size:55'320 bytes
                                                                                                                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:4
                                                                                                                                                                                                                  Start time:19:12:02
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                                                  Imagebase:0x7ff7b4ee0000
                                                                                                                                                                                                                  File size:55'320 bytes
                                                                                                                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:5
                                                                                                                                                                                                                  Start time:19:12:02
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\explorer.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\Explorer.EXE
                                                                                                                                                                                                                  Imagebase:0x7ff70ffd0000
                                                                                                                                                                                                                  File size:5'141'208 bytes
                                                                                                                                                                                                                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:6
                                                                                                                                                                                                                  Start time:19:12:02
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                                                                                                                                                                                                                  Imagebase:0x7ff7b4ee0000
                                                                                                                                                                                                                  File size:55'320 bytes
                                                                                                                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:7
                                                                                                                                                                                                                  Start time:19:12:03
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                                                                                                                                                                                  Imagebase:0x7ff7b4ee0000
                                                                                                                                                                                                                  File size:55'320 bytes
                                                                                                                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:8
                                                                                                                                                                                                                  Start time:19:12:05
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:explorer.exe
                                                                                                                                                                                                                  Imagebase:0xd90000
                                                                                                                                                                                                                  File size:4'514'184 bytes
                                                                                                                                                                                                                  MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:Borland Delphi
                                                                                                                                                                                                                  Yara matches:
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                  • Rule: JoeSecurity_CyberGate, Description: Yara detected CyberGate RAT, Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_517aac7d, Description: unknown, Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                  • Rule: RAT_CyberGate, Description: Detects CyberGate RAT, Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  • Rule: CyberGate, Description: unknown, Source: 00000008.00000003.1307346433.0000000005C4A000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                  • Rule: JoeSecurity_CyberGate, Description: Yara detected CyberGate RAT, Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_517aac7d, Description: unknown, Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                  • Rule: RAT_CyberGate, Description: Detects CyberGate RAT, Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  • Rule: CyberGate, Description: unknown, Source: 00000008.00000002.2518697463.0000000005C90000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  Reputation:moderate
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:9
                                                                                                                                                                                                                  Start time:19:12:06
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                                                                                                                                                                                  Imagebase:0x7ff7b4ee0000
                                                                                                                                                                                                                  File size:55'320 bytes
                                                                                                                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:10
                                                                                                                                                                                                                  Start time:19:12:07
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\3ClBcOpPUX.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:"C:\Users\user\Desktop\3ClBcOpPUX.exe"
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:290'304 bytes
                                                                                                                                                                                                                  MD5 hash:77515669C23C08469A95333A8D43BE63
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:Borland Delphi
                                                                                                                                                                                                                  Yara matches:
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:11
                                                                                                                                                                                                                  Start time:19:12:08
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\System\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:"C:\Windows\system32\System\svchost.exe"
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:290'304 bytes
                                                                                                                                                                                                                  MD5 hash:77515669C23C08469A95333A8D43BE63
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Yara matches:
                                                                                                                                                                                                                  • Rule: JoeSecurity_CyberGate, Description: Yara detected CyberGate RAT, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: Joe Security
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_517aac7d, Description: unknown, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: unknown
                                                                                                                                                                                                                  • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: unknown
                                                                                                                                                                                                                  • Rule: RAT_CyberGate, Description: Detects CyberGate RAT, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  • Rule: CyberGate, Description: unknown, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                                                                                                                  • Rule: MALWARE_Win_CyberGate, Description: Detects CyberGate/Spyrat/Rebhip RTA, Source: C:\Windows\SysWOW64\System\svchost.exe, Author: ditekSHen
                                                                                                                                                                                                                  Antivirus matches:
                                                                                                                                                                                                                  • Detection: 100%, Avira
                                                                                                                                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                                                                                                                                  • Detection: 97%, ReversingLabs
                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:12
                                                                                                                                                                                                                  Start time:19:12:08
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                                                  Imagebase:0x7ff7b4ee0000
                                                                                                                                                                                                                  File size:55'320 bytes
                                                                                                                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:13
                                                                                                                                                                                                                  Start time:19:12:09
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 7532 -ip 7532
                                                                                                                                                                                                                  Imagebase:0x7b0000
                                                                                                                                                                                                                  File size:483'680 bytes
                                                                                                                                                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:14
                                                                                                                                                                                                                  Start time:19:12:09
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7532 -s 564
                                                                                                                                                                                                                  Imagebase:0x7b0000
                                                                                                                                                                                                                  File size:483'680 bytes
                                                                                                                                                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:15
                                                                                                                                                                                                                  Start time:19:12:09
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                  Imagebase:0x7ff7b4ee0000
                                                                                                                                                                                                                  File size:55'320 bytes
                                                                                                                                                                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:17
                                                                                                                                                                                                                  Start time:21:12:47
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                                                                                                                                                  Imagebase:0x7ff693610000
                                                                                                                                                                                                                  File size:468'120 bytes
                                                                                                                                                                                                                  MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:18
                                                                                                                                                                                                                  Start time:21:12:47
                                                                                                                                                                                                                  Start date:13/01/2025
                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                  Imagebase:0x7ff75da10000
                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Reset < >

                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                    Execution Coverage:4.5%
                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:30%
                                                                                                                                                                                                                    Signature Coverage:13.8%
                                                                                                                                                                                                                    Total number of Nodes:747
                                                                                                                                                                                                                    Total number of Limit Nodes:9
                                                                                                                                                                                                                    execution_graph 16567 24081309 HeapFree 16576 24088dce 16577 24088dd9 16576->16577 16578 24088dde 16576->16578 16580 24088cf8 GetThreadLocale 16577->16580 16591 24088cd0 GetLocaleInfoA 16580->16591 16583 24088cd0 GetLocaleInfoA 16584 24088d36 16583->16584 16593 24083088 16584->16593 16587 24083088 6 API calls 16588 24088d4b 16587->16588 16597 240830ac 16588->16597 16592 24088cec 16591->16592 16592->16583 16594 240830a8 16593->16594 16595 2408308e 16593->16595 16594->16587 16595->16594 16601 2408135c 16595->16601 16599 240830b2 16597->16599 16598 240830d7 16598->16578 16599->16598 16600 2408135c 6 API calls 16599->16600 16600->16599 16602 2408136a 16601->16602 16604 24081360 16601->16604 16602->16594 16603 240813f5 16616 240813c4 16603->16616 16604->16602 16604->16603 16608 24084d70 16604->16608 16609 24084d7f 16608->16609 16610 24084da5 TlsGetValue 16608->16610 16609->16603 16611 24084d8a 16610->16611 16612 24084daf 16610->16612 16619 24084cb4 16611->16619 16612->16603 16615 24084d9e 16615->16603 16639 24082ff4 16616->16639 16620 24084cba 16619->16620 16621 24084cd3 16620->16621 16628 24084ce8 TlsGetValue 16620->16628 16629 24083000 16620->16629 16633 24084ca0 LocalAlloc 16621->16633 16624 24084cda 16625 24084cea TlsSetValue 16624->16625 16626 24084cde 16624->16626 16625->16628 16627 24083000 2 API calls 16626->16627 16627->16628 16628->16615 16630 24082ff4 16629->16630 16634 24082f24 16630->16634 16633->16624 16635 24082f3d 16634->16635 16636 24082f9f FreeLibrary 16635->16636 16637 24082fc4 ExitProcess 16635->16637 16636->16635 16640 24082f24 2 API calls 16639->16640 16641 240813cf 16640->16641 16641->16594 16657 520000 16658 520020 Sleep 16657->16658 16658->16658 16659 5530000 16663 240c6188 16659->16663 16793 240812f2 RtlAllocateHeap 16659->16793 16660 553001f 16664 240c6190 16663->16664 16664->16664 16794 24084dbc 16664->16794 16668 240c61bf 16801 24083388 16668->16801 16670 240c61d1 16823 24086ce4 16670->16823 16674 240c61f0 16845 24083590 16674->16845 16676 240c6218 16852 240835d0 16676->16852 16678 240c6239 16679 24083590 6 API calls 16678->16679 16680 240c625c 16679->16680 16681 240835d0 6 API calls 16680->16681 16682 240c627d 16681->16682 16857 24087be0 16682->16857 16687 240c62d4 16690 240c6332 16687->16690 16692 24083388 6 API calls 16687->16692 16688 240c6296 RegOpenKeyExA 16983 24083534 16688->16983 16693 240c633c DeleteFileA 16690->16693 16694 240c62f3 16692->16694 16695 240c634e 16693->16695 16985 24084f18 CreateMutexA 16694->16985 17025 24084f18 CreateMutexA 16695->17025 16698 240c6358 GetLastError 16702 240c636c ExitProcess 16698->16702 16703 240c6373 CreateThread CreateThread 16698->16703 16699 240c6305 GetLastError 16700 240c6328 16699->16700 16701 240c6319 CloseHandle 16699->16701 16986 240c5240 16700->16986 16701->16690 16705 240c63da 16703->16705 16706 240c63ab 16703->16706 16708 240c6413 GetCurrentProcessId 16705->16708 16711 240815e0 17 API calls 16705->16711 17026 240815e0 16706->17026 17083 24085c1c OpenProcess 16708->17083 16720 240c63ee 16711->16720 16712 240830ac 6 API calls 16714 240c6745 16712->16714 16714->16660 16716 240c63b5 16716->16705 17035 2408757c 16716->17035 16720->16708 17077 24087728 16720->17077 16727 24086588 6 API calls 16730 240c640b 16727->16730 16733 24087728 8 API calls 16730->16733 16733->16708 16793->16660 16797 24084dc7 16794->16797 16796 24084e01 16798 24087038 16796->16798 17106 24082e08 16797->17106 17113 24086edc LoadLibraryA GetProcAddress GetTempPathA 16798->17113 16800 2408704d 16800->16668 16802 2408338c 16801->16802 16809 24083344 16801->16809 16803 240830dc 16802->16803 16805 240833aa 16802->16805 16806 2408339c 16802->16806 16802->16809 16812 240830f0 16803->16812 17114 24083148 16803->17114 16804 2408311c 16804->16670 16808 24083148 6 API calls 16805->16808 16807 240830dc 6 API calls 16806->16807 16807->16809 16813 240833bd 16808->16813 16809->16803 16810 24083387 16809->16810 16814 24083352 16809->16814 16810->16670 16812->16804 16815 2408135c 6 API calls 16812->16815 16820 240830dc 6 API calls 16813->16820 16816 2408337c 16814->16816 16817 24083365 16814->16817 16815->16804 16819 240836bc 6 API calls 16816->16819 17119 240836bc 16817->17119 16821 2408336a 16819->16821 16822 240833e9 16820->16822 16821->16670 16822->16670 16824 24086cfd 16823->16824 16825 24083088 6 API calls 16824->16825 16826 24086d13 16825->16826 17142 24086c78 16826->17142 16828 24086d7c 16830 24083088 6 API calls 16828->16830 16829 24086d1b 16829->16828 16831 24086d36 CreateFileA GetFileSize 16829->16831 16832 24086d91 16830->16832 16833 24081344 6 API calls 16831->16833 16839 240830dc 16832->16839 16834 24086d4f ReadFile 16833->16834 17149 24083174 16834->17149 16837 2408135c 6 API calls 16838 24086d76 CloseHandle 16837->16838 16838->16828 16840 240830e0 16839->16840 16843 240830f0 16839->16843 16842 24083148 6 API calls 16840->16842 16840->16843 16841 2408311c 16841->16674 16842->16843 16843->16841 16844 2408135c 6 API calls 16843->16844 16844->16841 16846 240835c2 16845->16846 16847 24083595 16845->16847 16848 24083088 6 API calls 16846->16848 16847->16846 16849 240835a9 16847->16849 16851 240835b8 16848->16851 16850 24083174 6 API calls 16849->16850 16850->16851 16851->16676 17154 24083580 16852->17154 16854 24083614 16854->16678 16855 240835de 16855->16854 16856 240836bc 6 API calls 16855->16856 16856->16854 16858 24087bf6 16857->16858 17160 24087aa0 16858->17160 16860 24083088 6 API calls 16863 24087c14 16860->16863 16861 24087c60 16864 24083088 6 API calls 16861->16864 16863->16860 16863->16861 16865 240830dc 6 API calls 16863->16865 17183 24087a24 16863->17183 16866 24087c75 16864->16866 16865->16863 17177 24084500 16866->17177 16869 24083088 6 API calls 16870 24087c8b 16869->16870 16871 24087da8 16870->16871 16872 24087dbe 16871->16872 16873 240830dc 6 API calls 16872->16873 16874 24087dd0 16872->16874 16873->16872 16875 240830dc 6 API calls 16874->16875 16876 24087ddd 16875->16876 16877 240830dc 6 API calls 16876->16877 16878 24087dea 16877->16878 17291 24087d0c 16878->17291 16883 240830dc 6 API calls 16884 24087e11 16883->16884 16885 240830dc 6 API calls 16884->16885 16886 24087e1e 16885->16886 16887 240830dc 6 API calls 16886->16887 16888 24087e2b 16887->16888 16889 240830dc 6 API calls 16888->16889 16890 24087e38 16889->16890 16891 240830dc 6 API calls 16890->16891 16892 24087e45 16891->16892 16893 240830dc 6 API calls 16892->16893 16894 24087e52 16893->16894 16895 24087d0c 6 API calls 16894->16895 16896 24087e5a 16895->16896 16897 240858f0 6 API calls 16896->16897 16898 24087e67 16897->16898 16899 240858f0 6 API calls 16898->16899 16900 24087e77 16899->16900 16901 240830dc 6 API calls 16900->16901 16902 24087e8c 16901->16902 16903 240830dc 6 API calls 16902->16903 16904 24087e9c 16903->16904 16905 24087d0c 6 API calls 16904->16905 16906 24087ea7 16905->16906 16907 24087d0c 6 API calls 16906->16907 16908 24087eb7 16907->16908 16909 24087d0c 6 API calls 16908->16909 16910 24087ec7 16909->16910 16911 240830dc 6 API calls 16910->16911 16912 24087edc 16911->16912 16913 240830dc 6 API calls 16912->16913 16914 24087eec 16913->16914 16915 240830dc 6 API calls 16914->16915 16916 24087efc 16915->16916 16917 240830dc 6 API calls 16916->16917 16918 24087f0c 16917->16918 16919 240858f0 6 API calls 16918->16919 16920 24087f17 16919->16920 16921 240858f0 6 API calls 16920->16921 16922 24087f27 16921->16922 16923 24087d0c 6 API calls 16922->16923 16924 24087f37 16923->16924 16925 24087d0c 6 API calls 16924->16925 16926 24087f47 16925->16926 16927 24087d0c 6 API calls 16926->16927 16928 24087f57 16927->16928 16929 24087d0c 6 API calls 16928->16929 16930 24087f67 16929->16930 16931 24087d0c 6 API calls 16930->16931 16932 24087f77 16931->16932 16933 24087d0c 6 API calls 16932->16933 16934 24087f87 16933->16934 16935 24087d0c 6 API calls 16934->16935 16936 24087f97 16935->16936 16937 24087d0c 6 API calls 16936->16937 16938 24087fa7 16937->16938 16939 24087d0c 6 API calls 16938->16939 16940 24087fb7 16939->16940 16941 24087d0c 6 API calls 16940->16941 16942 24087fc7 16941->16942 16943 24087d0c 6 API calls 16942->16943 16944 24087fd7 16943->16944 16945 24087d0c 6 API calls 16944->16945 16946 24087fe7 16945->16946 16947 240858f0 6 API calls 16946->16947 16948 24087ff7 16947->16948 16949 240830dc 6 API calls 16948->16949 16950 2408800c 16949->16950 16951 24087d0c 6 API calls 16950->16951 16952 24088017 16951->16952 16953 24087d0c 6 API calls 16952->16953 16954 24088027 16953->16954 16955 24087d0c 6 API calls 16954->16955 16956 24088037 16955->16956 16957 240830dc 6 API calls 16956->16957 16958 2408804c 16957->16958 16959 24087d0c 6 API calls 16958->16959 16960 24088057 16959->16960 16961 240830dc 6 API calls 16960->16961 16962 2408806c 16961->16962 16963 240830dc 6 API calls 16962->16963 16964 2408807c 16963->16964 16965 240830dc 6 API calls 16964->16965 16966 2408808c 16965->16966 16967 240830dc 6 API calls 16966->16967 16968 2408809c 16967->16968 16969 24087d0c 6 API calls 16968->16969 16970 240880a7 16969->16970 16971 240830dc 6 API calls 16970->16971 16972 240880bc 16971->16972 16973 240830dc 6 API calls 16972->16973 16974 240880cc 16973->16974 16975 240830dc 6 API calls 16974->16975 16976 240880dc 16975->16976 16977 24087d0c 6 API calls 16976->16977 16978 240880e7 16977->16978 16979 240830dc 6 API calls 16978->16979 16980 240880ff 16979->16980 16981 240830dc 6 API calls 16980->16981 16982 2408810f 16981->16982 16982->16687 16982->16688 16984 24083538 RegDeleteKeyA RegCloseKey 16983->16984 16984->16687 16985->16699 16987 240c5248 16986->16987 16987->16987 16988 24086ce4 12 API calls 16987->16988 16989 240c5279 Sleep 16988->16989 16990 240c5291 16989->16990 16991 24083388 6 API calls 16990->16991 16993 240870b8 10 API calls 16990->16993 17006 240c55ab RegOpenKeyExA 16990->17006 17008 240c55d1 RegDeleteKeyA RegCloseKey 16990->17008 17014 24086858 9 API calls 16990->17014 17299 24086858 16990->17299 17311 24084f18 CreateMutexA 16990->17311 16991->16990 16993->16990 16994 240c5611 GetLastError 16995 240c561f CloseHandle CloseHandle 16994->16995 16996 240c5637 CloseHandle 16994->16996 16997 240c578d 16995->16997 16998 24086c78 8 API calls 16996->16998 16999 240830ac 6 API calls 16997->16999 17007 240c5644 16998->17007 17000 240c57aa 16999->17000 17003 24083088 6 API calls 17000->17003 17004 240c57b2 17003->17004 17004->16712 17005 24086588 6 API calls 17022 240c5667 17005->17022 17006->16990 17007->17022 17312 24086438 17007->17312 17324 24084f18 CreateMutexA 17007->17324 17008->16990 17010 240c574b GetLastError 17012 240c5759 CloseHandle 17010->17012 17013 240c5764 CloseHandle 17010->17013 17012->16989 17017 240c577a 17013->17017 17014->16990 17017->16989 17362 240866e4 LoadLibraryA GetProcAddress 17017->17362 17018 240815e0 17 API calls 17018->17022 17020 2408757c 14 API calls 17020->17022 17021 24087728 8 API calls 17021->17022 17022->17005 17022->17007 17022->17018 17022->17020 17022->17021 17023 24087668 11 API calls 17022->17023 17024 24087728 8 API calls 17022->17024 17325 24086634 17022->17325 17333 24087450 17022->17333 17351 24086da0 17022->17351 17023->17022 17024->17007 17025->16698 17027 24083088 6 API calls 17026->17027 17028 240815f4 17027->17028 17029 240815f8 GetModuleFileNameA 17028->17029 17030 24081616 GetCommandLineA 17028->17030 17031 24083174 6 API calls 17029->17031 17032 2408161d 17030->17032 17033 24081614 17031->17033 17032->17033 17401 240814f4 17032->17401 17033->16716 17036 2408758f 17035->17036 17417 24081644 GetSystemTime 17036->17417 17038 240875a2 17039 240875e0 CreateFileA 17038->17039 17040 2408762b SetFileTime 17039->17040 17041 240875ef CloseHandle CreateFileA 17039->17041 17042 2408763d CloseHandle 17040->17042 17043 24087611 SetFileTime 17041->17043 17044 24087623 CloseHandle 17041->17044 17045 24087650 17042->17045 17043->17044 17044->17042 17046 24083088 6 API calls 17045->17046 17047 24087658 17046->17047 17048 24086588 17047->17048 17049 2408659a 17048->17049 17418 24086518 17049->17418 17052 240865bf 17053 24086518 6 API calls 17052->17053 17065 240865e9 17052->17065 17055 240865cc 17053->17055 17054 24086518 6 API calls 17054->17052 17056 240865eb 17055->17056 17057 240865cf 17055->17057 17059 24086518 6 API calls 17056->17059 17058 24086518 6 API calls 17057->17058 17061 240865da 17058->17061 17062 240865f5 17059->17062 17060 24083088 6 API calls 17063 24086627 17060->17063 17064 24083590 6 API calls 17061->17064 17062->17065 17066 24086518 6 API calls 17062->17066 17069 24087668 17063->17069 17064->17065 17065->17060 17067 24086603 17066->17067 17068 24083590 6 API calls 17067->17068 17068->17065 17070 2408767a 17069->17070 17071 240876c6 CreateFileA 17070->17071 17072 240876fd CloseHandle 17071->17072 17073 240876d3 SetFileTime SetFileTime SetFileTime 17071->17073 17074 24087710 17072->17074 17073->17072 17075 24083088 6 API calls 17074->17075 17076 24087718 17075->17076 17076->16705 17078 24087739 17077->17078 17079 2408774f GetFileAttributesA SetFileAttributesA 17078->17079 17080 24087776 17079->17080 17081 24083088 6 API calls 17080->17081 17082 2408777e 17081->17082 17082->16727 17084 24085c71 17083->17084 17085 24085c34 NtQueryInformationProcess 17083->17085 17087 24085b30 GetVersionExA 17084->17087 17085->17084 17086 24085c4c NtSetInformationProcess CloseHandle 17085->17086 17086->17084 17088 24085bff 17087->17088 17089 24085b5f 6 API calls 17087->17089 17090 240867f8 17088->17090 17089->17088 17091 24083120 6 API calls 17090->17091 17092 2408681b 17091->17092 17422 2408673c 17092->17422 17095 24083088 6 API calls 17096 2408683a 17095->17096 17097 240833fc 17096->17097 17098 2408340d 17097->17098 17099 2408342d 17098->17099 17100 24083441 17098->17100 17101 240836bc 6 API calls 17099->17101 17102 24083148 6 API calls 17100->17102 17103 2408343b 17101->17103 17102->17103 17104 24083472 17103->17104 17105 240830dc 6 API calls 17103->17105 17105->17104 17108 24082e4e 17106->17108 17107 24082ec7 17107->16796 17108->17107 17109 24082f9f FreeLibrary 17108->17109 17110 24082fc4 17108->17110 17109->17108 17111 24082fcd 17110->17111 17112 24082fd3 ExitProcess 17110->17112 17111->17112 17113->16800 17115 2408314c 17114->17115 17116 24083170 17114->17116 17128 24081344 17115->17128 17116->16812 17118 24083159 17118->16812 17121 240836c9 17119->17121 17127 240836f9 17119->17127 17120 24083088 6 API calls 17123 240836e3 17120->17123 17122 240836f2 17121->17122 17124 240836d5 17121->17124 17125 24083148 6 API calls 17122->17125 17123->16821 17135 24081374 17124->17135 17125->17127 17127->17120 17129 24081352 17128->17129 17131 24081348 17128->17131 17129->17118 17130 240813f5 17133 240813c4 2 API calls 17130->17133 17131->17129 17131->17130 17132 24084d70 6 API calls 17131->17132 17132->17130 17134 24081417 17133->17134 17134->17118 17136 2408137a 17135->17136 17136->17123 17137 2408138c 17136->17137 17138 240813f5 17136->17138 17139 24084d70 6 API calls 17136->17139 17137->17123 17140 240813c4 2 API calls 17138->17140 17139->17138 17141 24081417 17140->17141 17141->17123 17143 24086c8d 17142->17143 17144 24086cac FindFirstFileA 17143->17144 17145 24086cbf 17144->17145 17146 24086cb7 FindClose 17144->17146 17147 24083088 6 API calls 17145->17147 17146->17145 17148 24086cd4 17147->17148 17148->16829 17150 24083148 6 API calls 17149->17150 17151 24083184 17150->17151 17152 24083088 6 API calls 17151->17152 17153 2408319c 17152->17153 17153->16837 17155 24083540 17154->17155 17156 24083148 6 API calls 17155->17156 17158 2408357a 17155->17158 17157 24083557 17156->17157 17157->17158 17159 2408135c 6 API calls 17157->17159 17158->16855 17159->17158 17191 24083120 17160->17191 17162 24087ad0 17164 24087b31 17162->17164 17165 24083590 6 API calls 17162->17165 17170 240835d0 6 API calls 17162->17170 17199 240844f4 17162->17199 17166 24087b64 17164->17166 17168 240844f4 9 API calls 17164->17168 17165->17162 17195 2408453c 17166->17195 17171 24087b52 17168->17171 17170->17162 17172 240830dc 6 API calls 17171->17172 17172->17166 17173 24084500 6 API calls 17174 24087b90 17173->17174 17175 24083088 6 API calls 17174->17175 17176 24087b98 17175->17176 17176->16863 17178 24084537 17177->17178 17181 24084506 17177->17181 17178->16869 17179 2408452f 17180 2408135c 6 API calls 17179->17180 17180->17178 17181->17178 17181->17179 17265 24083ac4 17181->17265 17185 24087a38 17183->17185 17184 24087a73 17186 240830dc 6 API calls 17184->17186 17185->17184 17285 24083588 17185->17285 17188 24087a7c 17186->17188 17189 24083088 6 API calls 17188->17189 17190 24087a92 17189->17190 17190->16863 17192 24083124 17191->17192 17193 24083146 17192->17193 17194 2408135c 6 API calls 17192->17194 17193->17162 17194->17193 17197 24084543 17195->17197 17196 2408455b 17196->17173 17197->17196 17198 24084500 6 API calls 17197->17198 17198->17196 17202 24084368 17199->17202 17203 24084387 17202->17203 17208 240843a1 17202->17208 17204 24084392 17203->17204 17219 2408141c 17203->17219 17225 24084360 17204->17225 17207 2408439c 17207->17162 17209 240843eb 17208->17209 17210 2408141c 6 API calls 17208->17210 17211 240843f8 17209->17211 17212 2408442d 17209->17212 17210->17209 17213 24081374 6 API calls 17211->17213 17214 24081344 6 API calls 17212->17214 17216 24084428 17213->17216 17215 24084437 17214->17215 17215->17216 17228 24084348 17215->17228 17216->17207 17218 24084368 9 API calls 17216->17218 17218->17216 17220 240813d0 17219->17220 17221 24084d70 6 API calls 17220->17221 17223 240813f5 17220->17223 17221->17223 17222 240813c4 2 API calls 17224 24081417 17222->17224 17223->17222 17224->17204 17226 24084500 6 API calls 17225->17226 17227 24084365 17226->17227 17227->17207 17231 24083dc0 17228->17231 17230 24084353 17230->17216 17232 24083dd5 17231->17232 17233 24083dfb 17231->17233 17235 24083dda 17232->17235 17236 24083e1d 17232->17236 17234 240830dc 6 API calls 17233->17234 17242 24083e18 17233->17242 17234->17233 17238 24083de4 17235->17238 17239 24083e45 17235->17239 17235->17242 17236->17242 17247 240837b4 17236->17247 17240 24083de9 17238->17240 17241 24083e66 17238->17241 17239->17242 17243 24083dc0 9 API calls 17239->17243 17240->17233 17240->17242 17245 24083e97 17240->17245 17241->17242 17257 24083ca4 17241->17257 17242->17230 17243->17239 17245->17242 17246 2408453c 6 API calls 17245->17246 17246->17245 17248 24083778 17247->17248 17249 240837bc 17247->17249 17250 2408378c 17248->17250 17251 2408377e SysFreeString 17248->17251 17249->17248 17252 240837c7 SysReAllocStringLen 17249->17252 17250->17236 17251->17250 17253 24083748 17252->17253 17254 240837d7 17252->17254 17255 24083764 17253->17255 17256 24083754 SysAllocStringLen 17253->17256 17254->17236 17255->17236 17256->17253 17256->17255 17263 24083cbe 17257->17263 17258 240830dc 6 API calls 17258->17263 17259 240837b4 3 API calls 17259->17263 17260 24083daa 17260->17241 17261 24083dc0 9 API calls 17261->17263 17262 24083ca4 9 API calls 17262->17263 17263->17258 17263->17259 17263->17260 17263->17261 17263->17262 17264 2408453c 6 API calls 17263->17264 17264->17263 17266 24083acd 17265->17266 17270 24083b02 17265->17270 17267 24083b07 17266->17267 17271 24083ae2 17266->17271 17268 24083b18 17267->17268 17269 24083b0e 17267->17269 17273 240830ac 6 API calls 17268->17273 17272 24083088 6 API calls 17269->17272 17270->17179 17271->17270 17274 24083b4c 17271->17274 17275 24083aee 17271->17275 17272->17270 17273->17270 17274->17270 17277 24083ac4 6 API calls 17274->17277 17276 24083b6a 17275->17276 17280 24083af2 17275->17280 17276->17270 17281 24083a90 17276->17281 17277->17274 17279 24084500 6 API calls 17279->17280 17280->17270 17280->17279 17282 24083aa2 17281->17282 17283 24083ac4 6 API calls 17282->17283 17284 24083abb 17282->17284 17283->17282 17284->17276 17286 24083540 17285->17286 17287 2408357a 17286->17287 17288 24083148 6 API calls 17286->17288 17287->17185 17289 24083557 17288->17289 17289->17287 17290 2408135c 6 API calls 17289->17290 17290->17287 17292 24087d1c 17291->17292 17293 24083088 6 API calls 17292->17293 17294 24087d52 17293->17294 17295 240858f0 17294->17295 17296 24085901 17295->17296 17297 24083088 6 API calls 17296->17297 17298 24085935 17297->17298 17298->16883 17300 24086870 17299->17300 17301 2408689c RegCreateKeyA 17300->17301 17302 240868ab 17301->17302 17303 240868c1 RegSetValueExA 17302->17303 17304 240868cf 17303->17304 17305 240868d1 RegCloseKey 17303->17305 17304->17305 17306 240868e7 17305->17306 17307 240830ac 6 API calls 17306->17307 17308 240868f4 17307->17308 17309 24083088 6 API calls 17308->17309 17310 240868fc 17309->17310 17310->17006 17311->16994 17313 2408644c 17312->17313 17314 24086c78 8 API calls 17313->17314 17315 24086473 17314->17315 17316 24086477 17315->17316 17364 240863e8 17315->17364 17319 24083a90 6 API calls 17316->17319 17320 240864fd 17319->17320 17321 24083088 6 API calls 17320->17321 17323 24086505 17321->17323 17323->17007 17324->17010 17326 24086648 17325->17326 17327 24086c78 8 API calls 17326->17327 17328 24086662 17327->17328 17329 240866bd 17328->17329 17330 2408667c GetFileAttributesA SetFileAttributesA DeleteFileA 17328->17330 17331 24083088 6 API calls 17329->17331 17330->17329 17332 240866d2 17331->17332 17332->17022 17334 24087465 17333->17334 17335 2408748b 17334->17335 17383 2408742c 17334->17383 17338 240830ac 6 API calls 17335->17338 17339 2408755f 17338->17339 17339->17022 17340 24083120 6 API calls 17341 2408749d 17340->17341 17348 240874bc 17341->17348 17387 24083344 17341->17387 17343 2408753b 17344 2408742c GetFileAttributesA 17343->17344 17344->17335 17345 24083590 6 API calls 17345->17348 17346 24083344 6 API calls 17346->17348 17347 240835d0 6 API calls 17347->17348 17348->17343 17348->17345 17348->17346 17348->17347 17349 2408742c GetFileAttributesA 17348->17349 17350 2408751b CreateDirectoryA 17348->17350 17349->17348 17350->17335 17350->17348 17352 24086db8 17351->17352 17353 24086de5 CreateFileA 17352->17353 17354 24086e1f 17353->17354 17355 24086df2 17353->17355 17359 240830ac 6 API calls 17354->17359 17356 24086e03 17355->17356 17357 24086df7 SetFilePointer 17355->17357 17358 24083588 6 API calls 17356->17358 17357->17356 17360 24086e12 WriteFile CloseHandle 17358->17360 17361 24086e39 17359->17361 17360->17354 17361->17022 17363 24086716 17362->17363 17363->17017 17365 24083534 17364->17365 17366 24086402 FindFirstFileA 17365->17366 17367 24086428 GetLastError 17366->17367 17368 24086412 17366->17368 17370 2408642f 17367->17370 17377 24085df8 17368->17377 17374 24085ddc 17370->17374 17371 24086419 17371->17370 17372 24085ddc FindClose 17371->17372 17373 24086426 17372->17373 17373->17370 17375 24085df4 17374->17375 17376 24085de7 FindClose 17374->17376 17375->17316 17376->17375 17378 24085e18 17377->17378 17379 24085e00 FindNextFileA 17378->17379 17380 24085e20 FileTimeToLocalFileTime FileTimeToDosDateTime 17378->17380 17379->17378 17381 24085e11 GetLastError 17379->17381 17382 24085e55 17380->17382 17381->17382 17382->17371 17384 24083534 17383->17384 17385 24087436 GetFileAttributesA 17384->17385 17386 24087441 17385->17386 17386->17335 17386->17340 17388 24083348 17387->17388 17389 24083387 17387->17389 17390 240830dc 17388->17390 17391 24083352 17388->17391 17389->17348 17397 24083148 6 API calls 17390->17397 17398 240830f0 17390->17398 17392 2408337c 17391->17392 17393 24083365 17391->17393 17395 240836bc 6 API calls 17392->17395 17394 240836bc 6 API calls 17393->17394 17399 2408336a 17394->17399 17395->17399 17396 2408311c 17396->17348 17397->17398 17398->17396 17400 2408135c 6 API calls 17398->17400 17399->17348 17400->17396 17402 24081506 17401->17402 17403 240814fe CharNextA 17402->17403 17404 24081520 17402->17404 17403->17402 17405 2408156f 17404->17405 17407 2408152a CharNextA 17404->17407 17408 2408155b CharNextA 17404->17408 17409 24081534 CharNextA 17404->17409 17410 24081551 CharNextA 17404->17410 17406 240836bc 6 API calls 17405->17406 17414 24081578 17406->17414 17407->17404 17408->17404 17409->17404 17410->17404 17411 240815d7 17411->17032 17412 240815bc CharNextA 17412->17414 17413 24081584 CharNextA 17413->17414 17414->17411 17414->17412 17414->17413 17415 2408158e CharNextA 17414->17415 17416 240815b2 CharNextA 17414->17416 17415->17414 17416->17414 17417->17038 17420 2408652c 17418->17420 17419 24083088 6 API calls 17421 24086578 17419->17421 17420->17419 17421->17052 17421->17054 17423 24083120 6 API calls 17422->17423 17424 24086764 17423->17424 17425 24083120 6 API calls 17424->17425 17426 2408676e 17425->17426 17431 240870b8 17426->17431 17429 240830ac 6 API calls 17430 2408679b 17429->17430 17430->17095 17432 240870d3 17431->17432 17433 240830dc 6 API calls 17432->17433 17434 240870fb 17433->17434 17435 2408710b RegOpenKeyExA 17434->17435 17436 24087174 17435->17436 17437 24087116 17435->17437 17439 240830ac 6 API calls 17436->17439 17438 2408712a RegQueryValueExA 17437->17438 17441 2408713a 17438->17441 17442 2408716b RegCloseKey 17438->17442 17440 2408718e 17439->17440 17443 24083088 6 API calls 17440->17443 17444 240836bc 6 API calls 17441->17444 17442->17436 17445 24086781 17443->17445 17446 24087144 17444->17446 17445->17429 17447 2408714f RegQueryValueExA 17446->17447 17448 240836bc 6 API calls 17447->17448 17448->17442 17454 24082ed0 17455 24082edc 17454->17455 17457 24082ef0 17455->17457 17458 24084b54 17455->17458 17459 24084b95 17458->17459 17460 24084b64 17458->17460 17459->17455 17460->17459 17464 240845b4 17460->17464 17462 24084b84 LoadStringA 17463 24083174 6 API calls 17462->17463 17463->17459 17465 240845db 17464->17465 17466 240845be 17464->17466 17465->17462 17466->17465 17469 2408456c 17466->17469 17470 2408457c GetModuleFileNameA 17469->17470 17471 24084598 17469->17471 17473 240847a8 GetModuleFileNameA RegOpenKeyExA 17470->17473 17471->17462 17474 2408482b 17473->17474 17475 240847eb RegOpenKeyExA 17473->17475 17491 240845f0 GetModuleHandleA 17474->17491 17475->17474 17476 24084809 RegOpenKeyExA 17475->17476 17476->17474 17478 240848b4 lstrcpyn GetThreadLocale GetLocaleInfoA 17476->17478 17480 240848eb 17478->17480 17481 240849ce 17478->17481 17480->17481 17485 240848fb lstrlen 17480->17485 17481->17471 17482 24084870 RegQueryValueExA 17483 2408488e RegCloseKey 17482->17483 17483->17471 17486 24084913 17485->17486 17486->17481 17487 24084938 lstrcpyn LoadLibraryExA 17486->17487 17488 24084960 17486->17488 17487->17488 17488->17481 17489 2408496a lstrcpyn LoadLibraryExA 17488->17489 17489->17481 17490 2408499c lstrcpyn LoadLibraryExA 17489->17490 17490->17481 17492 24084658 17491->17492 17493 24084618 GetProcAddress 17491->17493 17495 2408477a RegQueryValueExA 17492->17495 17505 2408468b 17492->17505 17508 240845dc 17492->17508 17493->17492 17494 24084629 17493->17494 17494->17492 17498 2408463f lstrcpyn 17494->17498 17495->17482 17495->17483 17496 2408469e lstrcpyn 17503 240846bc 17496->17503 17498->17495 17499 24084766 lstrcpyn 17499->17495 17501 240845dc CharNextA 17501->17503 17502 240845dc CharNextA 17502->17505 17503->17495 17503->17499 17503->17501 17504 240846db lstrcpyn FindFirstFileA 17503->17504 17504->17495 17506 24084706 FindClose lstrlen 17504->17506 17505->17495 17505->17496 17506->17495 17507 24084725 lstrcpyn lstrlen 17506->17507 17507->17503 17509 240845e4 17508->17509 17510 240845ef 17509->17510 17511 240845de CharNextA 17509->17511 17510->17495 17510->17502 17511->17509 17512 4d90000 GetModuleHandleA 17513 4d90022 RtlExitUserThread 17512->17513 17521 2a30000 17522 2a3001b RtlExitUserThread 17521->17522 17551 240b0db8 17552 24087038 3 API calls 17551->17552 17553 240b0df7 17552->17553 17554 240b0e02 SHGetFileInfo 17553->17554 17555 240b0e26 17554->17555 17556 24083088 6 API calls 17555->17556 17557 240b0e3e 17556->17557 17578 47d0000 LoadLibraryA 17579 47d0020 Sleep 17578->17579 17579->17579

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 0 240c6188-240c618b 1 240c6190-240c6195 0->1 1->1 2 240c6197-240c6294 call 24084dbc call 24087038 call 24083388 call 24086ce4 call 240830dc call 24083674 call 24083590 call 24083674 call 240835d0 call 24083674 call 24083590 call 24083674 call 240835d0 call 24087be0 call 24087da8 1->2 33 240c62d4-240c62dc 2->33 34 240c6296-240c62cf RegOpenKeyExA call 24083534 RegDeleteKeyA RegCloseKey 2->34 36 240c62de-240c6317 call 24083388 call 24083534 call 24084f18 GetLastError 33->36 37 240c6332-240c636a call 24083534 DeleteFileA call 24083534 call 24084f18 GetLastError 33->37 34->33 51 240c6328 call 240c5240 36->51 52 240c6319-240c6326 CloseHandle 36->52 53 240c636c-240c636e ExitProcess 37->53 54 240c6373-240c63a9 CreateThread * 2 37->54 58 240c632d 51->58 52->37 56 240c63da-240c63e2 54->56 57 240c63ab-240c63bf call 240815e0 call 24083480 54->57 59 240c63e4-240c63f8 call 240815e0 call 24083480 56->59 60 240c6413-240c644e GetCurrentProcessId call 24085c1c call 24085b30 call 240867f8 call 240833fc 56->60 57->56 74 240c63c1-240c63d5 call 2408757c call 24086588 call 24087668 57->74 62 240c672b-240c6745 call 240830ac 58->62 59->60 79 240c63fa-240c640e call 24087728 call 24086588 call 24087728 59->79 91 240c65ab-240c65d3 call 240b4448 call 240830dc 60->91 92 240c6454-240c6490 call 2409444c call 240830dc call 24083344 call 24086c78 60->92 74->56 79->60 103 240c65d5-240c65de call 240878c8 91->103 104 240c65e3-240c65eb 91->104 115 240c64b0-240c64d1 call 24086ce4 call 240830dc 92->115 116 240c6492-240c64ab call 2408333c call 24086da0 92->116 103->104 107 240c65ed-240c65f6 call 240878c8 104->107 108 240c65fb-240c663b call 240867f8 call 240833fc 104->108 107->108 120 240c663d-240c668a call 240c3a04 GetCurrentProcessId call 240858bc call 24086858 call 24084f18 call 240878c8 108->120 121 240c668f-240c66c4 call 240878c8 * 2 call 24084f18 call 24086c78 108->121 133 240c6551-240c6558 115->133 116->115 120->121 156 240c66fd-240c6705 121->156 157 240c66c6-240c66e4 call 24083534 call 240866e4 121->157 136 240c655e-240c65a9 call 24083534 SetFileAttributesA call 24087668 call 24083534 SetFileAttributesA call 240878c8 133->136 137 240c64d3-240c654c call 24083674 call 24083590 call 2409444c call 24083344 call 24083674 call 240835d0 * 2 133->137 136->91 137->133 159 240c66f8 call 240a8298 156->159 160 240c6707-240c6726 CloseHandle * 2 Sleep 156->160 157->156 174 240c66e6-240c66f6 Sleep CloseHandle 157->174 159->156 160->62 174->156
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,240D37BC,240CB980,240CB97C,00000000,240C6746,?,?,?,00000000,00000000), ref: 240C62AC
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 240C62C4
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,240D37BC,240CB980,240CB97C,00000000,240C6746,?,?,?,00000000), ref: 240C62CF
                                                                                                                                                                                                                    • GetLastError.KERNEL32(240CB980,240CB97C,00000000,240C6746,?,?,?,00000000,00000000), ref: 240C630D
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(0000047C,240CB980,240CB97C,00000000,240C6746,?,?,?,00000000,00000000), ref: 240C6321
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,240CB980,240CB97C,00000000,240C6746,?,?,?,00000000,00000000), ref: 240C633D
                                                                                                                                                                                                                      • Part of subcall function 24084F18: CreateMutexA.KERNEL32(?,?,?,?,?), ref: 24084F2E
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,240CB980,240CB97C,00000000,240C6746,?,?,?,00000000,00000000), ref: 240C6360
                                                                                                                                                                                                                    • ExitProcess.KERNEL32(00000000,00000000,240CB980,240CB97C,00000000,240C6746,?,?,?,00000000,00000000), ref: 240C636E
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00044C04,00000000,00000000,240D37B8), ref: 240C6385
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000451BC,00000000,00000000,240D37B8), ref: 240C639C
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000,Function_00044C04,00000000,00000000,240D37B8,00000000,240CB980,240CB97C,00000000), ref: 240C6413
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000,Function_00044C04,00000000), ref: 240C6570
                                                                                                                                                                                                                      • Part of subcall function 24087668: CreateFileA.KERNEL32(00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876C7
                                                                                                                                                                                                                      • Part of subcall function 24087668: SetFileTime.KERNEL32(00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876DC
                                                                                                                                                                                                                      • Part of subcall function 24087668: SetFileTime.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000), ref: 240876EA
                                                                                                                                                                                                                      • Part of subcall function 24087668: SetFileTime.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000), ref: 240876F8
                                                                                                                                                                                                                      • Part of subcall function 24087668: CloseHandle.KERNEL32(00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876FE
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(SQLite3.dll,240C67CC,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000,Function_00044C04,00000000), ref: 240C6642
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000002,00000000,00000080,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000), ref: 240C6590
                                                                                                                                                                                                                      • Part of subcall function 240878C8: CreateThread.KERNEL32(00000000,00000000,240A84FC,00000000,00000000), ref: 240878D6
                                                                                                                                                                                                                      • Part of subcall function 240878C8: SetThreadPriority.KERNEL32(00000000,00000000,00000000,00000000,240A84FC,00000000,00000000,?,00000000,?,240CB9C4,240A8377,?,240A84EC,?,240A84EC), ref: 240878DF
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,00000001,00000000,00000000,SQLite3.dll,240C67CC,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8), ref: 240C66EB
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,000003E8,00000001,00000000,00000000,SQLite3.dll,240C67CC,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000), ref: 240C66F1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,SQLite3.dll,240C67CC,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000,Function_00044C04), ref: 240C670F
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,SQLite3.dll,240C67CC,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000), ref: 240C671C
                                                                                                                                                                                                                    • Sleep.KERNEL32(00002EE0,00000000,00000000,SQLite3.dll,240C67CC,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000), ref: 240C6726
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Close$CreateHandle$Thread$ProcessTime$AttributesCurrentDeleteErrorLastSleep$ExitMutexOpenPriority
                                                                                                                                                                                                                    • String ID: ####$PIDprocess$SOFTWARE\Microsoft\$SPY_NET_RATMUTEX$SQLite3.dll$Software\Microsoft\Active Setup\Installed Components\$XX--XX--XX.txt$[LogFile]$_PERSIST$_x_X_PASSWORDLIST_X_x_$logs.dat$njkvenknvjebcddlaknvfdvjkfdskv$open
                                                                                                                                                                                                                    • API String ID: 2216801884-1096289745
                                                                                                                                                                                                                    • Opcode ID: 6e808c6c8252a0e6d866195205d9c579cd8f52a47483cfe9166fac5ca02a6d22
                                                                                                                                                                                                                    • Instruction ID: 83e58330049d86604956020f86129039bbc0234bfc5faf3b04b0645f70d47a3c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6e808c6c8252a0e6d866195205d9c579cd8f52a47483cfe9166fac5ca02a6d22
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 52E14E74744200DBE721DBA8CAD0F4DB3E6EBA5708F508934F500AB399DAB9ECC58B51

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 240847C4
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240847E2
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 24084800
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 2408481E
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,240848AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 24084867
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,24084A14,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,240848AD,?,80000001), ref: 24084885
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,240848B4,00000000,00000000,00000005,00000000,240848AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240848A7
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 240848C4
                                                                                                                                                                                                                    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 240848D1
                                                                                                                                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 240848D7
                                                                                                                                                                                                                    • lstrlen.KERNEL32(00000000), ref: 24084902
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 24084949
                                                                                                                                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 24084959
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 24084981
                                                                                                                                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 24084991
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 240849B7
                                                                                                                                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 240849C7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                                                                                                                                    • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                                                                                                                    • API String ID: 1759228003-3917250287
                                                                                                                                                                                                                    • Opcode ID: 77c2d60fd45ffa0c161ae41f00570ec2873ef225d055da03f2cac67fc35bed84
                                                                                                                                                                                                                    • Instruction ID: 271130a6f051932c0cb1659a4cf5d4df5416558ff2cf1fb7af6483c3d87ec32f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 77c2d60fd45ffa0c161ae41f00570ec2873ef225d055da03f2cac67fc35bed84
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C0514375A0025DBEFB22C6A48D85FEF7BEC9F14744F4001A1AA44E6185EA749FD48BA0

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 401 24086edc-24086efd LoadLibraryA GetProcAddress GetTempPathA
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetTempPathA,?,?,2408704D,?,24090C3E,00000000,24091156,?,?,?,?,00000044,00000000,00000000), ref: 24086EEC
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 24086EF2
                                                                                                                                                                                                                    • GetTempPathA.KERNELBASE(00000105,?,00000000,kernel32.dll,GetTempPathA,?,?,2408704D,?,24090C3E,00000000,24091156), ref: 24086EF9
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadPathProcTemp
                                                                                                                                                                                                                    • String ID: GetTempPathA$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 1686214323-3269217876
                                                                                                                                                                                                                    • Opcode ID: dfa7b7c115db29e24742a2fcb933de4f07472ccf342c221364485f4093a04760
                                                                                                                                                                                                                    • Instruction ID: 43eaa35b106326fd08bb34e4b73b812c28c25187c0d85543d9f5c18a7b748127
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dfa7b7c115db29e24742a2fcb933de4f07472ccf342c221364485f4093a04760
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3DC02B91101E303B372021F61EC0E9F008CDD650A7B010C217004E200FC8008D8038F0

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,24086CD5,?,00000000), ref: 24086CAD
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,24086CD5,?,00000000), ref: 24086CB8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2295610775-0
                                                                                                                                                                                                                    • Opcode ID: 60b479257f3b3c10ec452338eda81463d8a3a342b5f13493f911d3a5b52b4e9b
                                                                                                                                                                                                                    • Instruction ID: 8ceb04d42ec8a38bab2225475e9ec65668b594f18e0ef09d7274fa3bbae51d2e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 60b479257f3b3c10ec452338eda81463d8a3a342b5f13493f911d3a5b52b4e9b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0AF02770500104AFD701EBF8CF9199EB3ECEB6921479209B5E404D2664F7316F40AA10

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 482 24086c77-24086c85 483 24086c8d-24086cb5 call 24083534 FindFirstFileA 482->483 484 24086c88 call 24083524 482->484 487 24086cbf-24086cd4 call 24083088 483->487 488 24086cb7-24086cbd FindClose 483->488 484->483 488->487
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,24086CD5,?,00000000), ref: 24086CAD
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,24086CD5,?,00000000), ref: 24086CB8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2295610775-0
                                                                                                                                                                                                                    • Opcode ID: 9bd62b49d439f6542b680833016f58fc7673fd08b16c68d2ae6cd6e4bbba2389
                                                                                                                                                                                                                    • Instruction ID: de58a06098552d95e9b6490a60e44f3613f89d5d217135cedc47b3ed31b755c5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9bd62b49d439f6542b680833016f58fc7673fd08b16c68d2ae6cd6e4bbba2389
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8F02E70504104AFDB01DBF8CF51D9EB7FCDB6521479109B9E404D2665E7355F409A10

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,?,?,?,2408649A,00000000,24086506), ref: 24086403
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,?,?,?,?,2408649A,00000000,24086506), ref: 24086428
                                                                                                                                                                                                                      • Part of subcall function 24085DF8: FileTimeToLocalFileTime.KERNEL32(?), ref: 24085E25
                                                                                                                                                                                                                      • Part of subcall function 24085DF8: FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 24085E34
                                                                                                                                                                                                                      • Part of subcall function 24085DDC: FindClose.KERNEL32(?,?,24086426,00000000,?,?,?,?,2408649A,00000000,24086506), ref: 24085DE8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileTime$Find$CloseDateErrorFirstLastLocal
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 976985129-0
                                                                                                                                                                                                                    • Opcode ID: 1d764602b8cb8e00339e7ce8c91f8a4d82bf49f74a8dd3a0fa581d86529fcac6
                                                                                                                                                                                                                    • Instruction ID: e91888dae84ccaf7fa9ce3c20684f439895a30419fb55e3d49986d8bf0cb4097
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1d764602b8cb8e00339e7ce8c91f8a4d82bf49f74a8dd3a0fa581d86529fcac6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E8E02B72B022200B13105EBC6D9044F59C88F945F931616B9FD10DF30EE930CC8103D0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,24088D23,00000000,24088D66,?,?,00000000,00000000), ref: 24088CE3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InfoLocale
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2299586839-0
                                                                                                                                                                                                                    • Opcode ID: c0a5c38b77294cd5bc0105dacaac811761fc0667ac39b8f869ab3184c1b78c3f
                                                                                                                                                                                                                    • Instruction ID: 156ef1a38f183be9878bc82ff34450637604ad5780005f134fa4eaf346bc2697
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c0a5c38b77294cd5bc0105dacaac811761fc0667ac39b8f869ab3184c1b78c3f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 80D05B7731E1503AB210415A2E44D7B4ADCCBD5760F004079BA48C6105E5508C4A5375

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 203 240c5240-240c5243 204 240c5248-240c524d 203->204 204->204 205 240c524f-240c5274 call 24086ce4 204->205 207 240c5279-240c528b Sleep 205->207 208 240c5291-240c52c7 call 24083534 call 24083274 * 2 call 240870b8 207->208 209 240c5322-240c532a 207->209 245 240c52cc-240c52d6 call 24083480 208->245 211 240c5330-240c5366 call 24083534 call 24083274 * 2 call 240870b8 209->211 212 240c53c1-240c53c4 209->212 247 240c536b-240c5375 call 24083480 211->247 213 240c54d8-240c54e0 212->213 214 240c53ca-240c540a call 24083534 call 24083274 * 2 call 240870b8 call 24083480 212->214 220 240c55e4-240c561d call 24083388 call 24083534 call 24084f18 GetLastError 213->220 221 240c54e6-240c553c call 24083274 call 24083388 call 24083534 call 24083274 call 240870b8 call 24083480 213->221 274 240c540c-240c544c call 24083534 call 24083274 call 24083534 call 24083274 * 2 call 24086858 214->274 275 240c5451-240c5482 call 24083534 call 24083274 * 2 call 240870b8 214->275 253 240c561f-240c57b2 CloseHandle * 2 call 240830ac call 24083088 220->253 254 240c5637-240c5646 CloseHandle call 24086c78 220->254 300 240c553e-240c55a6 call 24083534 call 24083274 * 2 call 24083388 call 24083534 call 24083274 call 24086858 221->300 301 240c55ab-240c55df RegOpenKeyExA call 24083534 RegDeleteKeyA RegCloseKey 221->301 245->209 263 240c52d8-240c531d call 24083534 call 24083274 call 24083534 call 24083274 * 2 call 24086858 245->263 247->212 264 240c5377-240c53bc call 24083534 call 24083274 call 24083534 call 24083274 * 2 call 24086858 247->264 271 240c5648-240c564a call 24086438 254->271 272 240c5667-240c56b3 call 24086634 call 24086588 call 24083534 call 24083274 call 24087450 call 24086da0 254->272 263->209 264->212 289 240c564f-240c565a 271->289 365 240c56b5-240c56cf call 240815e0 call 24083480 272->365 366 240c56f0-240c56f8 272->366 274->275 339 240c5487-240c5491 call 24083480 275->339 298 240c565c 289->298 299 240c565f-240c5661 289->299 298->299 299->272 308 240c5735-240c5746 call 24083534 call 24084f18 299->308 300->301 301->220 337 240c574b-240c5757 GetLastError 308->337 345 240c5759-240c575f CloseHandle 337->345 346 240c5764-240c5788 CloseHandle call 24083534 call 240866e4 337->346 339->213 354 240c5493-240c54d3 call 24083534 call 24083274 call 24083534 call 24083274 * 2 call 24086858 339->354 345->207 346->207 354->213 365->366 385 240c56d1-240c56eb call 2408757c call 24086588 call 24087668 365->385 366->308 369 240c56fa-240c5714 call 240815e0 call 24083480 366->369 369->308 388 240c5716-240c5730 call 24087728 call 24086588 call 24087728 369->388 385->366 388->308
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C527E
                                                                                                                                                                                                                      • Part of subcall function 24086858: RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2408689E
                                                                                                                                                                                                                      • Part of subcall function 24086858: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000002,00000000,00000000,00000000,240868FD), ref: 240868C6
                                                                                                                                                                                                                      • Part of subcall function 24086858: RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,00000000,00000000,240868FD), ref: 240868D5
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,?,00000000,00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C55C0
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 240C55D6
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,?,00000000,00001388,00000000,240C57B3), ref: 240C55DF
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C5613
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C5620
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(0000047C,00000000,00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C562D
                                                                                                                                                                                                                      • Part of subcall function 240870B8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00000001,?,00000000,24087197), ref: 2408710D
                                                                                                                                                                                                                      • Part of subcall function 240870B8: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,24087197), ref: 24087131
                                                                                                                                                                                                                      • Part of subcall function 240870B8: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001), ref: 2408715B
                                                                                                                                                                                                                      • Part of subcall function 240870B8: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,24087197), ref: 2408716F
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C5638
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C574D
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C575A
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00001388,00000000,240C57B3,?,?,?,?,00000000,00000000), ref: 240C5765
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Close$Handle$Value$ErrorLastOpenQuery$CreateDeleteSleep
                                                                                                                                                                                                                    • String ID: Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run$Software\Microsoft\Windows\CurrentVersion\Run$StubPath$_SAIR$open
                                                                                                                                                                                                                    • API String ID: 3574299486-1043091203
                                                                                                                                                                                                                    • Opcode ID: 9c68d193a0ace123c51d74c5e1ee466423de4a6d01bf0fb3e20116c8d1a68c2e
                                                                                                                                                                                                                    • Instruction ID: 60268a2799a476cfc42c8b54e1ae92c6a0988cb9a732b0702eee736001d1996d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9c68d193a0ace123c51d74c5e1ee466423de4a6d01bf0fb3e20116c8d1a68c2e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E0F13D35A00158DBEB00EBE8DA80F8EB3F5BF96248F504165E404AB369DA75EEC5CF51

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00000001,?,00000000,24087197), ref: 2408710D
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,24087197), ref: 24087131
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001), ref: 2408715B
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,24087197), ref: 2408716F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: QueryValue$CloseOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1586453840-0
                                                                                                                                                                                                                    • Opcode ID: 7e46e4fc7e6460bdaee3dba2d0e5daa0c4dfacc7f36fefdb6b1be22ce7553f90
                                                                                                                                                                                                                    • Instruction ID: fc59dedf4a78d4527d88564ef84f6ce2b9f1be7c5dad4d92dc313162ff2f0f84
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7e46e4fc7e6460bdaee3dba2d0e5daa0c4dfacc7f36fefdb6b1be22ce7553f90
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ED212F71A00508AFEB00DBA8DE90EAEB7FCEF98244F504165B504E7258E771EE448B61

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24086C78: FindFirstFileA.KERNEL32(00000000,?,00000000,24086CD5,?,00000000), ref: 24086CAD
                                                                                                                                                                                                                      • Part of subcall function 24086C78: FindClose.KERNEL32(00000000,00000000,?,00000000,24086CD5,?,00000000), ref: 24086CB8
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,24086D92), ref: 24086D37
                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,24086D92), ref: 24086D41
                                                                                                                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,24086D92), ref: 24086D5C
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 24086D77
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseFind$CreateFirstHandleReadSize
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2300874643-0
                                                                                                                                                                                                                    • Opcode ID: 5d69ed1204bd4fe6b565c63fb9d11ef445a2e6174274233dbc884c8d8a6ab759
                                                                                                                                                                                                                    • Instruction ID: 6584dd9befaaa7f82e004e022196b7e7f4dc811c13472143ba70f62926f3cc64
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5d69ed1204bd4fe6b565c63fb9d11ef445a2e6174274233dbc884c8d8a6ab759
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2F114270A00604BFEB11DBA8CE91F6EBBF8DF96B04F5100A4F500EB298DB716E41DA55

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2408689E
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000002,00000000,00000000,00000000,240868FD), ref: 240868C6
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,00000000,00000000,240868FD), ref: 240868D5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseCreateValue
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1818849710-0
                                                                                                                                                                                                                    • Opcode ID: fd4e9ded3c1e21784cf2ccf1d43adafa77a7a481714871c2764f9a56f35ba37c
                                                                                                                                                                                                                    • Instruction ID: afd4936f07ff0d8c7272bc301a7fcc62b9098c169194652013cf811fcd2c3f36
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fd4e9ded3c1e21784cf2ccf1d43adafa77a7a481714871c2764f9a56f35ba37c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DE110071900108BFEB00EFA8DE91E9EB7ECEF69648F414475F804E7254DB719E818B50

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 502 4d90000-4d9002b GetModuleHandleA RtlExitUserThread
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNELBASE(?), ref: 04D90018
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 04D90023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515892776.0000000004D90000.00000040.00000400.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4d90000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitHandleModuleThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3752825402-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 508 4ae0000-4ae001d LoadLibraryA 509 4ae0020-4ae0029 Sleep 508->509 509->509
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 04AE001D
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 04AE0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515261897.0000000004AE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4ae0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2118945035-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 3d6dcf0603c0b7fa6df61d0a6d33d883493ae2c415736c940b7e86ed4b91e560
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03E00274D04608EFCB04DF99C98889DBBB5AF89320B25C295E865A73A5D730AE419A80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 04DC001D
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 04DC0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515954092.0000000004DC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04DC0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4dc0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2118945035-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: f9f4e5dc20143b8f85cd584f36b5cc39d4af475f4f01424f332b360aaee430c5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E4E09A74D00608EFCB04CF99C44888DBBB5AF48320B21C295E865973A5D730AE419A40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 0545001D
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 05450026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517607770.0000000005450000.00000040.00000400.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5450000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2118945035-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 62ac2a1164ed5bb1b6a20344c76fd19b9ef6bab414a194308cdcc08477aab154
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E8E00A74D04608EFCB04DF99C54889DBBB5AF49320B25C295E865973A5D7309E419A40

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 506 49f0000-49f001d LoadLibraryA 507 49f0020-49f0029 Sleep 506->507 507->507
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 049F001D
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 049F0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515014943.00000000049F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 049F0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_49f0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2118945035-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: de8843d6cffdc7bf5c0ce3b72ad9a08c990d02f5e1c05a9b2edb7ac214d5c06b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 49E09A74D00608EFCB04CF99C84888DBBB5AF48320B24C291E825973A5D730AE41DB40

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 510 4bd0000-4bd001d LoadLibraryA 511 4bd0020-4bd0029 Sleep 510->511 511->511
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 04BD001D
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 04BD0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515482294.0000000004BD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4bd0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2118945035-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 206675a295ea96bcc9cc5f5e9d419b45aca3427680115ea0045db42c2c73d0a5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E2E00A74D04608EFCB04DFA9C54889DBBB5AF49320F25C295E865973A5D730AE419A40

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 504 47d0000-47d001d LoadLibraryA 505 47d0020-47d0029 Sleep 504->505 505->505
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(?), ref: 047D001D
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 047D0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2514316641.00000000047D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 047D0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_47d0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2118945035-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 4f3077591483c2e23e2e345fd0b48ad5319088fc745d4a565e53310b627b9a36
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 36E00A74D04648EFCB04DFA9C54889DBBB5AF49320F25C295E865973A5D730AE419A40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00000400), ref: 240B0E03
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileInfo
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4041567068-0
                                                                                                                                                                                                                    • Opcode ID: 79fc499499914f8b2ba47a6ab4e4f6ed3c1c166222f177d5a1668bd616378986
                                                                                                                                                                                                                    • Instruction ID: b8fa5b23c36ca3177ef83a191b6ad2c91360fbb833dfb99a472bba9382015985
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 79fc499499914f8b2ba47a6ab4e4f6ed3c1c166222f177d5a1668bd616378986
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 07F0C230518218AFE711DB61CD91FDF7BBCEB89754F8104B4E504E7298D6B2AE808E64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleFileNameA.KERNEL32(24080000,?,00000105), ref: 2408458A
                                                                                                                                                                                                                      • Part of subcall function 240847A8: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 240847C4
                                                                                                                                                                                                                      • Part of subcall function 240847A8: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240847E2
                                                                                                                                                                                                                      • Part of subcall function 240847A8: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 24084800
                                                                                                                                                                                                                      • Part of subcall function 240847A8: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 2408481E
                                                                                                                                                                                                                      • Part of subcall function 240847A8: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,240848AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 24084867
                                                                                                                                                                                                                      • Part of subcall function 240847A8: RegQueryValueExA.ADVAPI32(?,24084A14,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,240848AD,?,80000001), ref: 24084885
                                                                                                                                                                                                                      • Part of subcall function 240847A8: RegCloseKey.ADVAPI32(?,240848B4,00000000,00000000,00000005,00000000,240848AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240848A7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2796650324-0
                                                                                                                                                                                                                    • Opcode ID: 758b88b33a212394f8d448a54f283aba4c3cd53dc29f1031e7330aff75646c12
                                                                                                                                                                                                                    • Instruction ID: c20b26df16d39c23b3e70a34be3ef7ed4af936d78f7bd09a519044eb467719ff
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 758b88b33a212394f8d448a54f283aba4c3cd53dc29f1031e7330aff75646c12
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6DE0ED75A002249FDB01DE5CC9C0A4A37D8AF49654F054A61AD54DF34BE371DA9087D1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 02A70023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2512164648.0000000002A70000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_2a70000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 05060023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516607089.0000000005060000.00000040.00000400.00020000.00000000.sdmp, Offset: 05060000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5060000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 02EC0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2513395859.0000000002EC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_2ec0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 02F00023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2513565376.0000000002F00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02F00000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_2f00000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 05240023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517055033.0000000005240000.00000040.00000400.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5240000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 04E80023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516135563.0000000004E80000.00000040.00000400.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4e80000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 04BA0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515423831.0000000004BA0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04BA0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4ba0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 05510023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517773133.0000000005510000.00000040.00000400.00020000.00000000.sdmp, Offset: 05510000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5510000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 048C0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2514674464.00000000048C0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_48c0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 049C0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2514960269.00000000049C0000.00000040.00000400.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_49c0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 02A30023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2512043811.0000000002A30000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_2a30000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 04AB0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515203868.0000000004AB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4ab0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 05150023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516823651.0000000005150000.00000040.00000400.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5150000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 02AB0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2512288608.0000000002AB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AB0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_2ab0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 047A0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2514229658.00000000047A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 047A0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_47a0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 04C90023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515645674.0000000004C90000.00000040.00000400.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4c90000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 05330023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517302691.0000000005330000.00000040.00000400.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5330000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 05420023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517544848.0000000005420000.00000040.00000400.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5420000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 04F70023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516388547.0000000004F70000.00000040.00000400.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4f70000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateMutexA.KERNEL32(?,?,?,?,?), ref: 24084F2E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateMutex
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1964310414-0
                                                                                                                                                                                                                    • Opcode ID: 4e517a16085b8900b141571b75f19e29287a41f7ed24e47c7e5cc36522aeb123
                                                                                                                                                                                                                    • Instruction ID: d54fbe9932f96986e32372636bce570d65cd7e85171800da9d8aaad5cb4f68cd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4e517a16085b8900b141571b75f19e29287a41f7ed24e47c7e5cc36522aeb123
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 67D01273250248AF8700DEBCDC05DAB33DCAB28509B008824B918C7105E139E9909B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateMutexA.KERNEL32(?,?,?,?,?), ref: 24084F2E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateMutex
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1964310414-0
                                                                                                                                                                                                                    • Opcode ID: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                                                                                                                                                                                                                    • Instruction ID: 40b23113d32118202df948085f3741d956f0cc7065c65c86cf6ff2069e504711
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5FC01273160248AF8B00EEA8DC05D9B33DCAB28609B008828B928CB105E139E5A09B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(02BA0000,00000000), ref: 24081301
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                    • Opcode ID: 9adf4e6e671955ea75501751516c186b4ec285f2aa2f8ee6c1224da2e83d2bf9
                                                                                                                                                                                                                    • Instruction ID: 6ac85cccd621e1fe138fbf0d6b83f0c3e6a692b518ced0c5e66d0e6c5fc50f8f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9adf4e6e671955ea75501751516c186b4ec285f2aa2f8ee6c1224da2e83d2bf9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A4B002A6610501EF9A41EEACDD44F6632EDE79D2443905460B608D7245D52DAC814B21
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 04FA0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516435625.0000000004FA0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4fa0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: a66f568b7c2a8952f9408ef335b7a548a38c5285293419062ac4faeb391d7efc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6FE09A74D00608EFCB04CF99C44888DBBB5AF48320B20C291E825973A5D730AE419A40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 05180026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516871358.0000000005180000.00000040.00000400.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5180000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 35a05de8538b7d56dbeb90ad0d2e559c4c6792c0e5f58338626515ced5123585
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DCE00274D04608EFCB14DF99C98889DBBB5AF89320B25C295E865A73A5D730AE419E80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 05090026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516671988.0000000005090000.00000040.00000400.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5090000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 9560eecf99cf61005495dec4bdbe04de6e45e62394fb05ff2082f5046fe89a4c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EEE00274D04608EFCB04DF99C98889DBBB5AF89320F25C295E865A73A5D730AE519A80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 05360026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517362956.0000000005360000.00000040.00000400.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5360000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 79bdf50c7181c17147bbd687f8a5ac6759ab2ffaed197ce0208f14c0cd5b9288
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1CE09274D04608EFCB04CF99C88888DBBB5AF88320B20C295E825A73A5D730AE419A80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 04CC0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2515702600.0000000004CC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4cc0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 5e8a04394fc077d180e871e60db5b89fdcc4bbacee028b089a64edb856b8b828
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7BE00274D04608EFCB04DF99C98889DBBB5AF89320B25C295E865A73A5D730AE419A80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 02F30026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2513692950.0000000002F30000.00000040.00000400.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_2f30000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 15d3d3b66fbaa0c9ed2825e626fa4f6c31866dad4dfbb14a7789b51096334045
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CBE00274D04608EFCB04DF99C98889DBBB5AF89320B25C295E965A73A5D730AE41DA80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 00520026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2511680052.0000000000520000.00000040.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_520000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: e4c35f613438a4ef54f6400bda3db0e23dd947093058edaf61e17cef691dbfd4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 16E00274D04608EFCB04DF99C98889DBBB5AF89320B25C295E865A73A5D730AE419A80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 04EB0026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2516204837.0000000004EB0000.00000040.00000400.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4eb0000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: cced881d7e076ddb83b870002673f0bf113c93167b8887f10267e9765c957dd3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2FE00A74D04608EFCB04DF99C54889EBBB5AF49320B25C295E865973A5D730AE419A80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 04900026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2514758610.0000000004900000.00000040.00000400.00020000.00000000.sdmp, Offset: 04900000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_4900000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: a0ab7fac490aa3feabcaa1bc5a5f67a8644700cec10ace5408e57d954df8f8b5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 52E00A74D04608EFCB04DF99C54889DBBB5AF49320B25C295E865973A5D730AE41DA40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNELBASE(FFFFFFFF), ref: 05270026
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517106391.0000000005270000.00000040.00000400.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5270000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: 1ac8f74a4c88990f81a636fc29cd56a7138fa5c4a1ab9619d8ef6ef63a43b383
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 21E00A74D14608EFCB04DF99C54889DBBB5AF49320B25C295E865973A5D7309E419E40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • HeapFree.KERNEL32(02BA0000,00000000), ref: 2408131B
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FreeHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3298025750-0
                                                                                                                                                                                                                    • Opcode ID: 7917dad080a0b46715423fa4768a55d94e6974e3c10b0cb94469a6004671e3a3
                                                                                                                                                                                                                    • Instruction ID: da51f0aab13dbaf5326aad5e1be3e1e7700299cab90a00110bdb8d6499e5f4ed
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7917dad080a0b46715423fa4768a55d94e6974e3c10b0cb94469a6004671e3a3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7C04CB3660602DB9F119AE8DCC2E1732DCE7682097245521F518DB111D52ED8D05620
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2517838333.0000000005530000.00000040.00000400.00020000.00000000.sdmp, Offset: 05530000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_5530000_explorer.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: a8f87fc558e2f538fd351bdfc49e2c6aa18e45c6a6d2c8ec1415aa36aaa266a9
                                                                                                                                                                                                                    • Instruction ID: 18b5e61e04c7bcae5a7a9f8a09946595db22e2a0f492063f86ebefdf2a899b08
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a8f87fc558e2f538fd351bdfc49e2c6aa18e45c6a6d2c8ec1415aa36aaa266a9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 33D01275914208EFDB04CF54D84589EBBF5EB44320F20C165E914973A0E731AE509A44
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExW.KERNEL32(0000011C), ref: 2408F8DA
                                                                                                                                                                                                                    • GetVersionExW.KERNEL32(00000094,0000011C), ref: 2408F8F6
                                                                                                                                                                                                                    • GetSystemInfo.KERNEL32(?,0000011C), ref: 2408F95C
                                                                                                                                                                                                                      • Part of subcall function 24085C78: wvsprintfA.USER32(?,00000000,?), ref: 24085D0E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Version$InfoSystemwvsprintf
                                                                                                                                                                                                                    • String ID: - Service Pack: %s$ Server (unknown edition)$%d.%d$%s %s$%s %s Server$%s (Build: %d$(unknown edition)$A$Business$Business N$Datacenter$Enterprise$Enterprise IA64$Enterprise N$Home Basic$Home Basic N$Premium$Premium N$Standard$Starter$Ultimate$Ultimate N$Unknown$Unknown Platform ID (%d)$Web$Windows 2000 Professional$Windows 2000 Server$Windows 2000 Server Datacenter$Windows 2000 Server Enterprise$Windows 2000 Server Web Edition$Windows 2003 Server$Windows 2003 Server (Release 2)$Windows 2003 Server Datacenter$Windows 2003 Server Enterprise$Windows 2003 Server Web Edition$Windows 2008$Windows 3.1$Windows 7$Windows 95$Windows 95 (Release 2)$Windows 98$Windows 98 SE$Windows Home Server$Windows ME$Windows NT %d.%d$Windows NT 4.0 Server$Windows NT 4.0 Server Datacenter$Windows NT 4.0 Server Enterprise$Windows NT 4.0 Server Web Edition$Windows Vista$Windows XP Home$Windows XP Professional$Windows XP Professional x64
                                                                                                                                                                                                                    • API String ID: 3060546747-1031444156
                                                                                                                                                                                                                    • Opcode ID: b47cf49586052f419e382a7e20faf0041ddb6a67089d78b9948c1d2e690f7c62
                                                                                                                                                                                                                    • Instruction ID: df17c93474257d39cc1073cc8c5cb0b09a26220fcbfa1e82950797719517ab0e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b47cf49586052f419e382a7e20faf0041ddb6a67089d78b9948c1d2e690f7c62
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AB728B70A04758CFDB60CB68C984BCEB7F4AF89708F0085E9C489A7255D774EAC89F52
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,240857EB,?,?,2409E487), ref: 24085578
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 24085590
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 240855A2
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 240855B4
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 240855C6
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 240855D8
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 240855EA
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 240855FC
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 2408560E
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 24085620
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 24085632
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 24085644
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 24085656
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 24085668
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 2408567A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 2408568C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 2408569E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                                                                                                                    • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 667068680-597814768
                                                                                                                                                                                                                    • Opcode ID: 39860cc1a93a84c3f6937a83a636479a7ba95729ee98c3ea7a590cc9805c7ebe
                                                                                                                                                                                                                    • Instruction ID: d8949b564c2a7657dad94ac6ec906ffb191b4b4a3187742a75d3338ef8206076
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 39860cc1a93a84c3f6937a83a636479a7ba95729ee98c3ea7a590cc9805c7ebe
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF3152B4911A10EFEB009FB5EAD4F2E3AEAFB162057804569F400EF248D63999C49F95
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 2408460D
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 2408461E
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,?), ref: 2408464E
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,?,kernel32.dll), ref: 240846B2
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll), ref: 240846E7
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 240846FA
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 24084707
                                                                                                                                                                                                                    • lstrlen.KERNEL32(?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 24084713
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 24084747
                                                                                                                                                                                                                    • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 24084753
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 24084775
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                                                                                                                                                                    • String ID: GetLongPathNameA$\$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 3245196872-1565342463
                                                                                                                                                                                                                    • Opcode ID: 70d04a5098422a145ddff46c07505126c9f0d4ada9d53650c8f13fa47754cd63
                                                                                                                                                                                                                    • Instruction ID: 4338a2c445a67e30b7a514790af59e863401a6efe9ebbfd8bf509ad5e6decf18
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 70d04a5098422a145ddff46c07505126c9f0d4ada9d53650c8f13fa47754cd63
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C6416C72D00259AFEB11CBB8CE84FDEBBECAF55204F0040B5A958E7244E7749E948B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 240C4A0D
                                                                                                                                                                                                                    • GetThreadContext.KERNEL32(?,00010002), ref: 240C4A41
                                                                                                                                                                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?,?,00010002), ref: 240C4A66
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000004,?,?,?,00000004,?,?,00010002), ref: 240C4AB5
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,00000000,?,?,?,?,?,00003000,00000004,?,?,?,00000004,?,?), ref: 240C4ADE
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,?,?,?,00003000,00000004,?), ref: 240C4B27
                                                                                                                                                                                                                    • VirtualProtectEx.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,?), ref: 240C4B4F
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,?,00000000,00000004,?,?,00000000,00000000,?,?,?,?,?,00003000,00000004,?), ref: 240C4B72
                                                                                                                                                                                                                    • SetThreadContext.KERNEL32(?,00010002,?,?,00000000,00000004,?,?,00000000,00000000,?,?,?,?,?,00003000), ref: 240C4B95
                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(?,00000000,240C4BD7), ref: 240C4BBC
                                                                                                                                                                                                                    • ResumeThread.KERNEL32(?,240C4BD7), ref: 240C4BC7
                                                                                                                                                                                                                      • Part of subcall function 240C493C: LoadLibraryA.KERNEL32(ntdll.dll,ZwUnmapViewOfSection,?,00000000,240C4A7E,?,?,?,00000004,?,?,00010002), ref: 240C494C
                                                                                                                                                                                                                      • Part of subcall function 240C493C: GetProcAddress.KERNEL32(00000000,ntdll.dll), ref: 240C4952
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$Memory$ThreadWrite$ContextVirtual$AddressAllocCreateLibraryLoadProcProtectReadResumeTerminate
                                                                                                                                                                                                                    • String ID: D
                                                                                                                                                                                                                    • API String ID: 4089571990-2746444292
                                                                                                                                                                                                                    • Opcode ID: 7bd270df3ce09b6d317d1dea3223581e19d0dba858853319a29ceec56bec96ee
                                                                                                                                                                                                                    • Instruction ID: 2e52714fcd95cef4594376e977f5d8d7e86e866cf632b54e2488db645d1595fc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7bd270df3ce09b6d317d1dea3223581e19d0dba858853319a29ceec56bec96ee
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A181C2B1A00208AFEB51DBE8DD81FEEBBF8FF58304F104465E604E7255D674E9848B64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 240A7471
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 240A7479
                                                                                                                                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 240A7481
                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 240A7492
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 240A74B0
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000A), ref: 240A74BA
                                                                                                                                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,00000000,00000000), ref: 240A74CA
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 240A74D7
                                                                                                                                                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00CC0020), ref: 240A74F5
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,0000000A), ref: 240A7500
                                                                                                                                                                                                                    • DeleteDC.GDI32(00000000), ref: 240A7506
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 240A750D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CapsCompatibleCreateDeviceObjectSelect$BitmapClientDeleteDesktopRectReleaseWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 337914687-0
                                                                                                                                                                                                                    • Opcode ID: f1b76e16a75b4e8c41da1ba234a25fc9606e6697ddba96ae8bac77b0f0e9eb6f
                                                                                                                                                                                                                    • Instruction ID: 82de52993a7b4f1a5b6b84c5932fd767c35311b83bdbd33e7a8ffb36127e6a80
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f1b76e16a75b4e8c41da1ba234a25fc9606e6697ddba96ae8bac77b0f0e9eb6f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 641160712457157FE311ABA88D80F3F7AEDDF96A54F404918F984A7245DB34EC8087B2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,240B0C93,?,00000000,240B0D1E), ref: 240B0B62
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,?,00000000,240B0C93,?,00000000,240B0D1E), ref: 240B0C6F
                                                                                                                                                                                                                    • FindClose.KERNEL32(000000FF,240B0C9A,240B0C93,?,00000000,240B0D1E), ref: 240B0C8D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                    • String ID: %DESKTOP%$%RECENT%$%SYS%$%WIN%$*.*$Desktop$Recent
                                                                                                                                                                                                                    • API String ID: 3541575487-3092682246
                                                                                                                                                                                                                    • Opcode ID: ec5a4f1bb3086719f1f4a9bc20d7a7ebcda19e8f596e255f5bf9d2ae10768227
                                                                                                                                                                                                                    • Instruction ID: 1cd4b8d1061c332d3ca40c0b0e512078209f0fb5d942fe5388a1b68589ce260f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ec5a4f1bb3086719f1f4a9bc20d7a7ebcda19e8f596e255f5bf9d2ae10768227
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA814830A0461D9FDB11DB94CE80A9EB3B9FF99308F5084E9D488A7248DB71AFC58F55
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000008), ref: 240C03C9
                                                                                                                                                                                                                    • GetKeyState.USER32(00000014), ref: 240C03EC
                                                                                                                                                                                                                    • GetKeyState.USER32(00000010), ref: 240C03F9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: State$Async
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 993286747-0
                                                                                                                                                                                                                    • Opcode ID: b84a4695beba6443555084af221b8449dda9ac50571e9db9884ce59f4f8eb9e1
                                                                                                                                                                                                                    • Instruction ID: 8d67679355f059371e97a67b7036a14d9e101ddf765597e44d65d15b57859324
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b84a4695beba6443555084af221b8449dda9ac50571e9db9884ce59f4f8eb9e1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CBB12434714245CBE311E768C684BDEB3E3AFA5308F9084A0A5449F369DEB6DDC24F51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExA.KERNEL32(?), ref: 240AC441
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000020,?,00000000,240AC4E9,?,?), ref: 240AC467
                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000020,?,00000000,240AC4E9,?,?), ref: 240AC46D
                                                                                                                                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 240AC480
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000,00000020,?,00000000,240AC4E9,?,?), ref: 240AC4AA
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000), ref: 240AC4D1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?), ref: 240AC4DA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Token$AdjustPrivilegesProcess$CloseCurrentHandleLookupOpenPrivilegeValueVersion
                                                                                                                                                                                                                    • String ID: SeDebugPrivilege
                                                                                                                                                                                                                    • API String ID: 3222167619-2896544425
                                                                                                                                                                                                                    • Opcode ID: e2c99be8d6ef531b310329a404707eadcf86c4b495a4a577218cf05a241eb51b
                                                                                                                                                                                                                    • Instruction ID: c643fb9694b335e928241480d7b787165963904f8353b599f1a0e75def4a030f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e2c99be8d6ef531b310329a404707eadcf86c4b495a4a577218cf05a241eb51b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 852172B1A04208BEFB10CBE4DD45FEFBBBCEB05708F1144A5E704E6185E6745A848FA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExA.KERNEL32(00000094), ref: 24085B4D
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000020,?,00000000,24085BF5,?,00000094), ref: 24085B73
                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000020,?,00000000,24085BF5,?,00000094), ref: 24085B79
                                                                                                                                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 24085B8C
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,?,00000000,00000020,?,00000000,24085BF5,?,00000094), ref: 24085BB6
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,?,?,00000000,00000001,00000000,00000000,?,00000000,00000020,?,00000000), ref: 24085BDD
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,00000001,00000000,00000000,?,?,00000000,00000001,00000000,00000000,?,00000000,00000020,?), ref: 24085BE6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Token$AdjustPrivilegesProcess$CloseCurrentHandleLookupOpenPrivilegeValueVersion
                                                                                                                                                                                                                    • String ID: SeDebugPrivilege
                                                                                                                                                                                                                    • API String ID: 3222167619-2896544425
                                                                                                                                                                                                                    • Opcode ID: e3a341f096ad53d33e2fcd37da28399bbce27359c83d5c7a6c38cf2511b19f25
                                                                                                                                                                                                                    • Instruction ID: 65c708978f2a120bc28892b833299d91b42c295770cb7848f347b1e5bd043064
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e3a341f096ad53d33e2fcd37da28399bbce27359c83d5c7a6c38cf2511b19f25
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 14210371A00208BEFB10CBA5DE55FEFBBBCEB15704F5044A5E604E6181EA755A848FA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240AC424: GetVersionExA.KERNEL32(?), ref: 240AC441
                                                                                                                                                                                                                      • Part of subcall function 240AC424: GetCurrentProcess.KERNEL32(00000020,?,00000000,240AC4E9,?,?), ref: 240AC467
                                                                                                                                                                                                                      • Part of subcall function 240AC424: OpenProcessToken.ADVAPI32(00000000,00000020,?,00000000,240AC4E9,?,?), ref: 240AC46D
                                                                                                                                                                                                                      • Part of subcall function 240AC424: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 240AC480
                                                                                                                                                                                                                      • Part of subcall function 240AC424: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000,00000020,?,00000000,240AC4E9,?,?), ref: 240AC4AA
                                                                                                                                                                                                                      • Part of subcall function 240AC424: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000), ref: 240AC4D1
                                                                                                                                                                                                                      • Part of subcall function 240AC424: CloseHandle.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?), ref: 240AC4DA
                                                                                                                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,240ACD0F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 240ACC29
                                                                                                                                                                                                                    • CreateServiceA.ADVAPI32(00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,240ACCD4), ref: 240ACC6A
                                                                                                                                                                                                                      • Part of subcall function 24086858: RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2408689E
                                                                                                                                                                                                                      • Part of subcall function 24086858: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000002,00000000,00000000,00000000,240868FD), ref: 240868C6
                                                                                                                                                                                                                      • Part of subcall function 24086858: RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,00000000,00000000,240868FD), ref: 240868D5
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 240ACCBF
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,?,00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 240ACCC5
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Close$HandleServiceToken$AdjustCreateOpenPrivilegesProcessValue$CurrentLookupManagerPrivilegeVersion
                                                                                                                                                                                                                    • String ID: Description$System\CurrentControlSet\Services\
                                                                                                                                                                                                                    • API String ID: 3877902884-3489731058
                                                                                                                                                                                                                    • Opcode ID: 9a0b62fd6d984170c5ad2a7505ea9847ebe06638d16effb31841ee3752c8e559
                                                                                                                                                                                                                    • Instruction ID: 4119923525d2f5f7ad66db6561a858890574030ec671d0f966480f87724eb80a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9a0b62fd6d984170c5ad2a7505ea9847ebe06638d16effb31841ee3752c8e559
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B921E770A04219AFEB01DBE1CD51FAFBBF8EF95744F118035E600A7298DE759981CA64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,240AC93E), ref: 240AC89D
                                                                                                                                                                                                                    • OpenServiceA.ADVAPI32(00000000,00000000,00000020,00000000,00000000,000F003F,00000000,240AC93E), ref: 240AC8CD
                                                                                                                                                                                                                    • StartServiceA.ADVAPI32(00000000,00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,240AC93E), ref: 240AC8F5
                                                                                                                                                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,240AC93E), ref: 240AC903
                                                                                                                                                                                                                    • QueryServiceStatus.ADVAPI32(00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,240AC93E), ref: 240AC90D
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,240AC93E), ref: 240AC913
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,240AC93E), ref: 240AC919
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Service$CloseHandleOpen$ControlManagerQueryStartStatus
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1698138069-0
                                                                                                                                                                                                                    • Opcode ID: 344efda87ddb6d0244a93ceef55f82d995d2f73bd47fe966ab28a5e7173072c9
                                                                                                                                                                                                                    • Instruction ID: 1356bbf25fe69f358075657191841b52d1daf6e5f7ed69793ef279b670921a7e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 344efda87ddb6d0244a93ceef55f82d995d2f73bd47fe966ab28a5e7173072c9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7221B571E08228AEEB01DEF48C44FAE77FCEB65614F124435E600E3204DA719A818A65
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 240AB36C
                                                                                                                                                                                                                    • VirtualFreeEx.KERNEL32(00000000,?,00000000,00008000,?,00000000), ref: 240AB396
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 240AB3A5
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 240AB3B8
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 240AB3C0
                                                                                                                                                                                                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000), ref: 240AB3E1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 240AB3E7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Handle$ModuleVirtual$AllocCloseCreateFreeMemoryProcessRemoteThreadWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2398686212-0
                                                                                                                                                                                                                    • Opcode ID: 320e831d3db3fd37a1909f490eb8679622ef688ad2e82d5ecf3d3b5ad779abdd
                                                                                                                                                                                                                    • Instruction ID: 2a9b0eff2ce8090d2b9901b7a008506786236bc742ca8e3c10c83ab9f57a414f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 320e831d3db3fd37a1909f490eb8679622ef688ad2e82d5ecf3d3b5ad779abdd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F5111CB16483047FE350DA698D81F2FBBEDDBC4B14F548828B648DB281D670E84487A6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,24086160), ref: 24086067
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,24086160), ref: 24086108
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,24086160), ref: 2408611C
                                                                                                                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,24086160), ref: 2408612A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseDirectoryFirstNextRemove
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 81111410-438819550
                                                                                                                                                                                                                    • Opcode ID: f44dd8451d94908377e351809a3ef052a581cbca13785e8e9f919bf6a5cbe050
                                                                                                                                                                                                                    • Instruction ID: 7698063760a6dbb61d817c2006e18c422c7c8a3581a6066dbc84a2267262fad2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f44dd8451d94908377e351809a3ef052a581cbca13785e8e9f919bf6a5cbe050
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EB416D30A00608ABEB10DBA4CF80ACEB7F5AFD5758F5185B4D404A735AEB31AFC58E51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,24086160), ref: 24086067
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,24086160), ref: 24086108
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,24086160), ref: 2408611C
                                                                                                                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,24086160), ref: 2408612A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseDirectoryFirstNextRemove
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 81111410-438819550
                                                                                                                                                                                                                    • Opcode ID: 4c030c3950bbef0631a150432673120d0db357fa0d4627a6a695e9e0aaca64d1
                                                                                                                                                                                                                    • Instruction ID: aa455c1306ca748723992af8ee51eb36ed302166786371418a3e339c22e238bb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4c030c3950bbef0631a150432673120d0db357fa0d4627a6a695e9e0aaca64d1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FA318130900608ABEB11DBE4CF80A8EB7F4AFD5758F5145B4D404A735AEB31AFC18E51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenClipboard.USER32(00000000), ref: 240ACE11
                                                                                                                                                                                                                    • GetClipboardData.USER32(0000000F), ref: 240ACE26
                                                                                                                                                                                                                    • DragQueryFile.SHELL32(00000000,000000FF,00000000,00000000), ref: 240ACE38
                                                                                                                                                                                                                    • DragQueryFile.SHELL32(00000000,00000000,00000000,00000105), ref: 240ACE6B
                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 240ACEB6
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Clipboard$DragFileQuery$CloseDataOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3062564445-0
                                                                                                                                                                                                                    • Opcode ID: e0dceee8c1bd39cee9fbd9b24a83ff4ae3c0aa2806b27e77456caafc19e911b4
                                                                                                                                                                                                                    • Instruction ID: 21c2928a1178f84fac58b3fe00b8b20abb8fa02fb9d9a49ef5ba362ae7afd610
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e0dceee8c1bd39cee9fbd9b24a83ff4ae3c0aa2806b27e77456caafc19e911b4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CD215C3050862C7FF712DBA8CC50FDF7EB9DB99B44F4200F4E604A2284DAB549C08EA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenClipboard.USER32(00000000), ref: 240ACFDC
                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00002002,00000000,00000000,240AD092,?,00000000), ref: 240ACFF5
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(?), ref: 240AD00F
                                                                                                                                                                                                                    • SetClipboardData.USER32(00000001,?), ref: 240AD03A
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(?), ref: 240AD050
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Global$Clipboard$AllocDataLockOpenUnlock
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3395808788-0
                                                                                                                                                                                                                    • Opcode ID: 5fc4303aa5ac159be724660b4e9fb940535989ea8bfd5f94d5b2a71d768a9f8b
                                                                                                                                                                                                                    • Instruction ID: e1f670fe9767e1a47b5a6f7d70a9c5607cf248d1db0657ed52db441e337caf38
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5fc4303aa5ac159be724660b4e9fb940535989ea8bfd5f94d5b2a71d768a9f8b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BE012F70200704BFF7128FB5DE71E2EBBAEDB5AA44BC20860FA00C3A04D9769D50CDA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,240AC9CF), ref: 240AC97B
                                                                                                                                                                                                                    • OpenServiceA.ADVAPI32(00000000,00000000,00010000,00000000,00000000,000F003F,00000000,240AC9CF), ref: 240AC995
                                                                                                                                                                                                                    • DeleteService.ADVAPI32(00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,240AC9CF), ref: 240AC9A1
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,240AC9CF), ref: 240AC9AE
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,240AC9CF), ref: 240AC9B4
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Service$CloseHandleOpen$DeleteManager
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 204194956-0
                                                                                                                                                                                                                    • Opcode ID: 5d8e3f8f3b4f6b5f4b43c002c1e179242b27bbb121da3e3c960a40674b34612d
                                                                                                                                                                                                                    • Instruction ID: ef67621835be4fc40a79d7c21f5be899f17b56b03fec41528d6c3a1963692e5c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5d8e3f8f3b4f6b5f4b43c002c1e179242b27bbb121da3e3c960a40674b34612d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6101F4716087247AF712DAB5CD55F2F769CDFA5658F030471BB00A6288DEB08E8095A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetPropA.USER32(?,OBJECT,00000000), ref: 240AEAC8
                                                                                                                                                                                                                    • GetPropA.USER32(?,OBJECT), ref: 240AEAEC
                                                                                                                                                                                                                    • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 240AEB30
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Prop$NtdllProc_Window
                                                                                                                                                                                                                    • String ID: OBJECT
                                                                                                                                                                                                                    • API String ID: 1456104087-1481993322
                                                                                                                                                                                                                    • Opcode ID: d7f3349067f6d571eb6176f930057e4cef61dd13c4399eb666c69671f3ed84e6
                                                                                                                                                                                                                    • Instruction ID: e9e2e137cbae3e0fa5b2f9c52a66f367a7d282de8256e5234044eff5076e7dac
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d7f3349067f6d571eb6176f930057e4cef61dd13c4399eb666c69671f3ed84e6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1C213071A11229AFD700CFA8C984DAFBBF9EF49610B504169FD45EB300D770DE448BA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00003000,00000040), ref: 240C482D
                                                                                                                                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00003000,00000040), ref: 240C4840
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040,00000000,00000000,00008000,?,?,00003000,00000040), ref: 240C485A
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,?,?,?,?,?,?,00003000,00000040), ref: 240C489C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$Alloc$FreeMemoryProcessWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2022580353-0
                                                                                                                                                                                                                    • Opcode ID: 914536b1b8aa764b6814e80e1b55df6753d14af1d98b1894871ba7de307621ad
                                                                                                                                                                                                                    • Instruction ID: 78dafd8a7f2686a249cfde6ffcc8d1192c47f8a2ca109cf1e394441238cac9f3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 914536b1b8aa764b6814e80e1b55df6753d14af1d98b1894871ba7de307621ad
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3C311971A00245EBEB40CAA9CD81F9EBBF9FB98604F508064EA04E7644D674EA548BA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,00000000,?,240CB980,?,240C641D,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000,Function_00044C04), ref: 24085C29
                                                                                                                                                                                                                    • NtQueryInformationProcess.NTDLL(00000000,00000016,?,00000004,00000000), ref: 24085C40
                                                                                                                                                                                                                    • NtSetInformationProcess.NTDLL(00000000,00000016,?,00000004), ref: 24085C5E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,001F0FFF,00000000,00000000,?,240CB980,?,240C641D,00000000,00000000,Function_000451BC,00000000,00000000,240D37B8,00000000,00000000), ref: 24085C6C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$Information$CloseHandleOpenQuery
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1636144130-0
                                                                                                                                                                                                                    • Opcode ID: 8b0411576a1d48e6dbe04b4ade3104a22fdf87d3cfc7ab914bc7621fac0affc4
                                                                                                                                                                                                                    • Instruction ID: 2878b598d9c0f3458bc33b304419cd33c772740ea96656668a389b7a3b3379aa
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8b0411576a1d48e6dbe04b4ade3104a22fdf87d3cfc7ab914bc7621fac0affc4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DDF0E5723863143EF3315A544EC2FAF268DDF15BA8F000529F740D60C0C3589EC856E6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?), ref: 240AD3AB
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?), ref: 240AD3B6
                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 240AD3CF
                                                                                                                                                                                                                    • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 240AD3E0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileTime$Find$CloseDateFirstLocal
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2659516521-0
                                                                                                                                                                                                                    • Opcode ID: bc18a95d79a38cb25cabca8d8cea9629f06e396e38b576b1112dcdfe7026f1e7
                                                                                                                                                                                                                    • Instruction ID: 2c51c5b57760e82c913d616b771ef1d0a6758554383f9de2a44dcf55d2a79552
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bc18a95d79a38cb25cabca8d8cea9629f06e396e38b576b1112dcdfe7026f1e7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75F01272D0024C66DB11DBE58D849CFB3FC9F19214F5006A6E619D21D6FB34AB849BA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000005,00000000,240ACBBC), ref: 240ACA42
                                                                                                                                                                                                                    • EnumServicesStatusA.ADVAPI32(00000000,0000013F,00000003,?,00004800,?,?,?,00000000,00000000,00000005,00000000,240ACBBC), ref: 240ACA7C
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,0000013F,00000003,?,00004800,?,?,?,00000000,00000000,00000005,00000000,240ACBBC), ref: 240ACB99
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseEnumHandleManagerOpenServiceServicesStatus
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 236840872-0
                                                                                                                                                                                                                    • Opcode ID: f055424034dcd8ad995ca2098d98aa884f3f36329fe5df601860722a51ec36f6
                                                                                                                                                                                                                    • Instruction ID: e1851471c51b200b567766870b23dae0123b000041c704876e487b711211e06b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f055424034dcd8ad995ca2098d98aa884f3f36329fe5df601860722a51ec36f6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C851B3B09041689BEF11DB94CD40B8EB7F9EF58704F11C8A6A304A6258DEB69FC5CF94
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetKeyboardLayoutNameA.USER32(?), ref: 24088E18
                                                                                                                                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,00001001,?,00000040,00000000,24088F57), ref: 24088E7B
                                                                                                                                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,00000002,?,00000040,00000000,00001001,?,00000040,00000000,24088F57), ref: 24088EDE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InfoLocale$KeyboardLayoutName
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3953094008-0
                                                                                                                                                                                                                    • Opcode ID: dcb3d6fc136b17e0cc09dccacee25ae6f563d5167a4ea418523229c5a5065539
                                                                                                                                                                                                                    • Instruction ID: a7de17463bf9b8672700977f6a9692cb43fe1037bea6c5b4cb15ec170310b6aa
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dcb3d6fc136b17e0cc09dccacee25ae6f563d5167a4ea418523229c5a5065539
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FB310C30A0021D9FEB24DB61CD90FCDB3BAAF94304F4084E5960CA655AEB75AF898F55
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • WSAStartup.WS2_32(00000002,?), ref: 2409E14F
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000002,00000002,00000000,2409E1E7,?,00000002,?), ref: 2409E1C1
                                                                                                                                                                                                                    • WSACleanup.WS2_32 ref: 2409E1E1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CleanupHeapProcessStartup
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1581707949-0
                                                                                                                                                                                                                    • Opcode ID: 6417c44ca987680ec8269f9c4a0a73358d61271665c58d01ec468633ca4878b5
                                                                                                                                                                                                                    • Instruction ID: 3efc5ae402745d003a7f647a3cd3a89e21a58c32fa220c626884af5c5b40f184
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6417c44ca987680ec8269f9c4a0a73358d61271665c58d01ec468633ca4878b5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7116D70909204BFFB11CF64CE1EF697BE8D785B10F500278B618A95E1E6745AC0EB56
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLogicalDriveStringsA.KERNEL32(00000200,00000000), ref: 240B095E
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001,00000000,240B09C9,?,?,?,00000000,00000000), ref: 240B0965
                                                                                                                                                                                                                    • GetDriveTypeA.KERNEL32(00000000,240B09E0,?,?,00000001,00000000,240B09C9,?,?,?,00000000,00000000), ref: 240B0981
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Drive$ErrorLogicalModeStringsType
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2040483995-0
                                                                                                                                                                                                                    • Opcode ID: 21af6301e4383a60b267d77919e6aef4ba687db46a133fa7f8a09336d5cdb994
                                                                                                                                                                                                                    • Instruction ID: 2750ecc62d4e3e62a68a737cda081424d3af883419236b75662827b522e61893
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 21af6301e4383a60b267d77919e6aef4ba687db46a133fa7f8a09336d5cdb994
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 94012B307043087FFB1297A0CD91F6E769DEB95704F510475F640A228DDD759EC08E6A
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetKeyboardState.USER32(?,240D32F8,240D3310,00000008,240C1C21,00000010,00000000,240C1D9B,?,?,?,?,00000000,00000000), ref: 240C0326
                                                                                                                                                                                                                    • MapVirtualKeyA.USER32(240D32F8,00000000), ref: 240C034C
                                                                                                                                                                                                                    • ToAscii.USER32(240D32F8,00000000,?,00000000,00000000), ref: 240C0353
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AsciiKeyboardStateVirtual
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1835671472-0
                                                                                                                                                                                                                    • Opcode ID: c2fdc19dcd3515717c7fdfbf9e1a8ae958a982b41a0d4f373b62abf17821b794
                                                                                                                                                                                                                    • Instruction ID: 30b8776423390409e60af3780e99756b8cca8bf51f80fc654e201e23549bd15e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c2fdc19dcd3515717c7fdfbf9e1a8ae958a982b41a0d4f373b62abf17821b794
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09F089A270021077F30016BDCD81F7F548DABD115DF40457AB648C63CAD4A6CDC849E3
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(00000000,00000000,00000000,00003000,00000040), ref: 240AB320
                                                                                                                                                                                                                    • VirtualProtectEx.KERNEL32(00000000,00000000,00000000,00000040,00000040,00000000,00000000,00000000,00003000,00000040), ref: 240AB331
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000040,00000040,00000000,00000000,00000000,00003000,00000040), ref: 240AB33F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$AllocMemoryProcessProtectWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4073123320-0
                                                                                                                                                                                                                    • Opcode ID: 56a4fa6d0645d3133e1c967b66819faa260882d9c1448904df0e9c057e9cc939
                                                                                                                                                                                                                    • Instruction ID: ec3fc5a8395f1374215d0fbbce632eae93c84ba03dde5342e0e435e0f1e76053
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 56a4fa6d0645d3133e1c967b66819faa260882d9c1448904df0e9c057e9cc939
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7CE06D623062543AF321009B1D85FAB6A9CCBC6BAAF10013AFB08A51C0E991AD4541B9
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • keybd_event.USER32(00000000,00000001,00000000,00000000), ref: 240B49DD
                                                                                                                                                                                                                    • keybd_event.USER32(00000000,00000001,00000002,00000000), ref: 240B49E9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: keybd_event
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2665452162-0
                                                                                                                                                                                                                    • Opcode ID: 9e1432e1e18d23246adf1469c9ffbdc09c085d17ac10e580e743c58d46fc305b
                                                                                                                                                                                                                    • Instruction ID: 0d2d97dafe3bcee5b9ed1b3e0b556e2b890e37e705b73a2f7cc539446712dd4b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9e1432e1e18d23246adf1469c9ffbdc09c085d17ac10e580e743c58d46fc305b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ED117730744204ABFB10DBA4CD91B9EB7E9EFA8304F608160A440F7799EAB59F80965D
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(?,00000000,00000001,00003000,00000040,00000000,240C3F3E,?,?,?,?,00000000,00000000,00000000), ref: 240C3EFC
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,?,00000001,?,?,00000000,00000001,00003000,00000040,00000000,240C3F3E), ref: 240C3F1E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocMemoryProcessVirtualWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 645232735-0
                                                                                                                                                                                                                    • Opcode ID: 9dce58e893b70c0d385be3412142bb6dea6624c4ec192c00eb49b1f259c0ead4
                                                                                                                                                                                                                    • Instruction ID: 670fc7e47a18eb5832661f4ee273d3a68bd1ec9e4419dc5af7cbe6603f157dbd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9dce58e893b70c0d385be3412142bb6dea6624c4ec192c00eb49b1f259c0ead4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9E01F431600248BFFB11CAA1CD51FAFF7ADEBD9B44F6140B1F900E7284DAB5AE418564
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(?,00000000,?,00003000,00000040,?,?,?,?,?,240C3F9D), ref: 240C3F66
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,?,?,?,?,00000000,?,00003000,00000040,?,?,?,?,?,240C3F9D), ref: 240C3F72
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocMemoryProcessVirtualWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 645232735-0
                                                                                                                                                                                                                    • Opcode ID: 1b34d99aab3994f6339959341006049085c8a587ea987c4491767cdf6ce40f0b
                                                                                                                                                                                                                    • Instruction ID: 8676e0f0080f1343b268aa5802eae8353383cdc0aa1c01798f287bb214c501db
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1b34d99aab3994f6339959341006049085c8a587ea987c4491767cdf6ce40f0b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1FD05EA234621437F234106B6C45FAB1E4DCBC7BF9E110036B708E6281D4925C0041B8
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                    • API String ID: 0-2766056989
                                                                                                                                                                                                                    • Opcode ID: ab98c2aed12ef7e826b10b711029d19c4dedaf7dfd46895b92a267d123399ca2
                                                                                                                                                                                                                    • Instruction ID: 534700772c3e8222777ece1412b50ff606525f1daa3f4d8bec12aeaa028077fa
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ab98c2aed12ef7e826b10b711029d19c4dedaf7dfd46895b92a267d123399ca2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 53F14774E00269CFCB14CFE8C580AEEBBB2FF88314F248169D951AB351D7B59A81CB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 240AB6A5
                                                                                                                                                                                                                      • Part of subcall function 240AB624: 6ED92200.AVICAP32(Video,50000000,00000000,00000000,00000280,000001E0,?,00000001,240B9038,000003E8,000003E8,240BE184,webcamgetbuffer,240BE184,webcam,240BE184), ref: 240AB644
                                                                                                                                                                                                                      • Part of subcall function 240AB624: SendMessageA.USER32(?,0000040B,00000000,00000000), ref: 240AB65D
                                                                                                                                                                                                                      • Part of subcall function 240AB624: UnregisterClassA.USER32(MainForm,?), ref: 240AB674
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassD92200MessageNtdllProc_SendUnregisterWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2584475382-0
                                                                                                                                                                                                                    • Opcode ID: 74626c36f2ce0fe2ba0b25495e6ac0bbee8d73dfe1dc0e3524e6ddd753c88333
                                                                                                                                                                                                                    • Instruction ID: 62e514c3206881a8b174c8894201bffe12ad9eebb8f85f0b0a6b5d09a11e2709
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 74626c36f2ce0fe2ba0b25495e6ac0bbee8d73dfe1dc0e3524e6ddd753c88333
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DAD06272A0016C6B9750DDE9DCC0C9BB3ECEB19164B544511FF14D7201D575DD5087B1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocaleInfoA.KERNEL32(00000400,0000005A,00000005,00000005), ref: 24088F9B
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InfoLocale
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2299586839-0
                                                                                                                                                                                                                    • Opcode ID: 28c5b5fb3c4d62c0abc58585841f9c2e4756f30ed3372ed4e41b974c69bd6d78
                                                                                                                                                                                                                    • Instruction ID: 5743a79b4e39abd6233bdd8bf1a4a5a9a85ef4933f4049e609da7448167a1b63
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 28c5b5fb3c4d62c0abc58585841f9c2e4756f30ed3372ed4e41b974c69bd6d78
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0AD095133487002BF81081741F8170D53C45790335F500235F704DF2C6DDA5C44D6757
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetUserNameA.ADVAPI32(00000000), ref: 2409180B
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: NameUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2645101109-0
                                                                                                                                                                                                                    • Opcode ID: ef5e2074d3a2af1871b8af6108e12c260b89c9224399b4e881205f4710e18838
                                                                                                                                                                                                                    • Instruction ID: 0018626f68cccbc35ec4a16505f92b095720753c52eebf6585240af9562ebcd1
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ef5e2074d3a2af1871b8af6108e12c260b89c9224399b4e881205f4710e18838
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DED05E72304210ABFA00A7789E8089E56CCDFA55A8B000439F084CB209C97A8C8583A5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSystemTime.KERNEL32(?), ref: 2408164E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: SystemTime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2656138-0
                                                                                                                                                                                                                    • Opcode ID: 564a6395351698595fdb5722eddf0d527c13ade55289ec0eb4d0e07075f9208a
                                                                                                                                                                                                                    • Instruction ID: 24dc1a89084b4a0a210609edafe67ebf93abdf2363aceda81fbdba882826ba09
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 564a6395351698595fdb5722eddf0d527c13ade55289ec0eb4d0e07075f9208a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1CE08611E0050E86CB04AFA5CD436EDF7BEEFA5500F044172A818EA2D0F631C792C344
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 591cb859711fab9ed46bfe1b3f20604925a5fa05e4c43a8bf956a236709ee330
                                                                                                                                                                                                                    • Instruction ID: ffc9a9d20b05c6644f5d4388ad327aac4b89e1e99f7b388e4fb441f4ffedbd89
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 591cb859711fab9ed46bfe1b3f20604925a5fa05e4c43a8bf956a236709ee330
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B2521274200214CFDB1ACF68C5C0A577BE2BB49314F1486A9DD468F28BC734E996CFA2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: a46a25728c0e4dbe5aa0a1433bd48846487817f0c63754d6310f19dcd07371b1
                                                                                                                                                                                                                    • Instruction ID: 699dac9fede36f649ac90fd3507987b5886e716aa5aacc918041474151cfc273
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a46a25728c0e4dbe5aa0a1433bd48846487817f0c63754d6310f19dcd07371b1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9A61233238DB8103E33D8E7D5CE02B7DAD35FCA21862ED97D94DAC3F52E85AA4565204
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 06de988cec878ba0ca36bc87ef1ab69ba565fea0b0e74ecb0b3620ea03bb8e49
                                                                                                                                                                                                                    • Instruction ID: 38ef5d6753b6c2d5a976dfa3aea941ceeb7f0cce08687278d9cb5981a65d473a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06de988cec878ba0ca36bc87ef1ab69ba565fea0b0e74ecb0b3620ea03bb8e49
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D7817C73D114374BEB628EA88C443A17392AFCC39EF5B46B0EE04BB64AD534BD5186C0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: fdd6e5c21f8e827ed8dbbf5a91f2e70f5af707ada584e64f1391109d8132eb73
                                                                                                                                                                                                                    • Instruction ID: 4e24f6b4f3e1b7025789b109135905238c69c312b8a018972671bd5aa78fc23e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fdd6e5c21f8e827ed8dbbf5a91f2e70f5af707ada584e64f1391109d8132eb73
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 29713773D214779BEB608EA888443617392FF8921CF6B46B0DE05BB647C634BD4296D0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 5b11512028303bfa0212bcb5a4be5029ed673fec3b531c205c09ceb8686c6913
                                                                                                                                                                                                                    • Instruction ID: 765a02390459b722a7e42cc91e8e35948eb20d4447e2402fcb4df8627caf6720
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b11512028303bfa0212bcb5a4be5029ed673fec3b531c205c09ceb8686c6913
                                                                                                                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 65b6c3cfccdfbc13d2c4430a2e4818bbeaec33822d90a4aef412c98eaaa4eb50
                                                                                                                                                                                                                    • Instruction ID: b73129b27390d48c7e33efaa9897afac445b3a33389757b875c844398a45cc5b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 65b6c3cfccdfbc13d2c4430a2e4818bbeaec33822d90a4aef412c98eaaa4eb50
                                                                                                                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(PSAPI.dll,?,240AC0D5), ref: 240ABD48
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 240ABD64
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 240ABD76
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 240ABD88
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 240ABD9A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 240ABDAC
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 240ABDBE
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 240ABDD0
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 240ABDE2
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 240ABDF4
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EmptyWorkingSet), ref: 240ABE06
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,QueryWorkingSet), ref: 240ABE18
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeProcessForWsWatch), ref: 240ABE2A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMappedFileNameA), ref: 240ABE3C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameA), ref: 240ABE4E
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverFileNameA), ref: 240ABE60
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMappedFileNameA), ref: 240ABE72
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameA), ref: 240ABE84
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverFileNameA), ref: 240ABE96
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMappedFileNameW), ref: 240ABEA8
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameW), ref: 240ABEBA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                                                                                                                    • String ID: EmptyWorkingSet$EnumDeviceDrivers$EnumProcessModules$EnumProcesses$GetDeviceDriverBaseNameA$GetDeviceDriverBaseNameW$GetDeviceDriverFileNameA$GetDeviceDriverFileNameW$GetMappedFileNameA$GetMappedFileNameW$GetModuleBaseNameA$GetModuleBaseNameW$GetModuleFileNameExA$GetModuleFileNameExW$GetModuleInformation$GetProcessMemoryInfo$InitializeProcessForWsWatch$PSAPI.dll$QueryWorkingSet
                                                                                                                                                                                                                    • API String ID: 2238633743-2267155864
                                                                                                                                                                                                                    • Opcode ID: 679cdb755da540f30d0bf9d195abba68b29756466005435138b47e1bae2e4b6e
                                                                                                                                                                                                                    • Instruction ID: 5f2050a9966ed69662b8963369bb0cb3408b06068752157d5f341148dbf79fc1
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 679cdb755da540f30d0bf9d195abba68b29756466005435138b47e1bae2e4b6e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 31414DB0914A20AFEB00DFF5C9D4F2A3BE9EB162087450569F600EF658D639D9C4AF91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24084F18: CreateMutexA.KERNEL32(?,?,?,?,?), ref: 24084F2E
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B4697
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B46B2
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B46BF
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B46E1
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Run,?), ref: 240B4707
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B471C
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000), ref: 240B4724
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,?), ref: 240B473E
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B4753
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000), ref: 240B475B
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?), ref: 240B4775
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B478A
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000), ref: 240B4792
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?), ref: 240B47A2
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,00000000,00000000,00000000), ref: 240B47B7
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,00000000,00000000), ref: 240B47BF
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B47E0
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 240B47F5
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000080,00000000,00000000,00000000,240B4885), ref: 240B47FD
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000000,00000000,80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000080,00000000), ref: 240B4814
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 240B4829
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000000,00000000,80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?), ref: 240B4831
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\,00000000,00020006,?,00000000,00000080,00000000,00000000,00000000,240B4885,?,?,00000000,00000000,00000000), ref: 240B4848
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 240B485D
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\,00000000,00020006,?,00000000,00000080,00000000,00000000,00000000,240B4885), ref: 240B4865
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Close$DeleteOpen$Value$Handle$AttributesCreateFileMutexSleep
                                                                                                                                                                                                                    • String ID: Software\$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run$Software\Microsoft\Windows\CurrentVersion\Run$_SAIR$exit
                                                                                                                                                                                                                    • API String ID: 2709957979-2341067361
                                                                                                                                                                                                                    • Opcode ID: 51a89a01d2178feaa59726530b3847a02c50a33d72caa2ea782ed869ece21656
                                                                                                                                                                                                                    • Instruction ID: b03a5f83277aec06b835a215a81c1517e203e7727acf484ece3fc80a12f918f2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 51a89a01d2178feaa59726530b3847a02c50a33d72caa2ea782ed869ece21656
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6C51CE74600254EFE700DFA9DAC4F1A73E9EB6A248F500460B540FB359EA78EDC08F65
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24086C78: FindFirstFileA.KERNEL32(00000000,?,00000000,24086CD5,?,00000000), ref: 24086CAD
                                                                                                                                                                                                                      • Part of subcall function 24086C78: FindClose.KERNEL32(00000000,00000000,?,00000000,24086CD5,?,00000000), ref: 24086CB8
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 24090F9B
                                                                                                                                                                                                                    • TranslateMessage.USER32(?), ref: 24090FAC
                                                                                                                                                                                                                    • DispatchMessageA.USER32(?), ref: 24090FB8
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 24090FBD
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064,00000000,00000000,00000000,2409155C,?,2409155C,", True),?,Set objFile = objFileSystem.CreateTextFile(",00000000,24091156), ref: 24091003
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,00000064,00000000,00000000,00000000,2409155C,?,2409155C,", True),?,Set objFile = objFileSystem.CreateTextFile(",00000000,24091156), ref: 24091011
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000, / ,?,?,?,?,00000000,00000064,00000000,00000000,00000000,2409155C,?,2409155C,", True),?), ref: 24091126
                                                                                                                                                                                                                      • Part of subcall function 240866E4: LoadLibraryA.KERNEL32(shell32.dll,ShellExecuteA,?,?,?,?,2408627C,?,00000000,00000000,00000000,240862A2), ref: 240866FA
                                                                                                                                                                                                                      • Part of subcall function 240866E4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 24086700
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • CountFW = 0, xrefs: 24090D27
                                                                                                                                                                                                                    • Set colFirewall = objSecurityCenter.ExecQuery("Select * From FirewallProduct",,48), xrefs: 24090C9B
                                                                                                                                                                                                                    • For Each objAntiVirus In colAntiVirus, xrefs: 24090DAB
                                                                                                                                                                                                                    • cscript.exe, xrefs: 24090E4C, 24090EBB, 24090EF4, 24090F63
                                                                                                                                                                                                                    • open, xrefs: 24090ED2, 24090F7A
                                                                                                                                                                                                                    • CountAV = 0, xrefs: 24090D3D
                                                                                                                                                                                                                    • Set objFile = objFileSystem.CreateTextFile(", xrefs: 24090CDD
                                                                                                                                                                                                                    • Enter = Chr(13) + Chr(10), xrefs: 24090D11
                                                                                                                                                                                                                    • Set objFileSystem = CreateObject("Scripting.fileSystemObject"), xrefs: 24090CC7
                                                                                                                                                                                                                    • objFile.Close, xrefs: 24090E19
                                                                                                                                                                                                                    • Next, xrefs: 24090D95, 24090DED
                                                                                                                                                                                                                    • Set colAntiVirus = objSecurityCenter.ExecQuery("Select * From AntiVirusProduct",,48), xrefs: 24090CB1
                                                                                                                                                                                                                    • / , xrefs: 24091097, 240910EC
                                                                                                                                                                                                                    • teste.vbs, xrefs: 24090C47
                                                                                                                                                                                                                    • CountAV = CountAV + 1, xrefs: 24090DC1
                                                                                                                                                                                                                    • Info = Info & "A" & CountAV & ") " & objAntiVirus.displayName & " v" & objAntiVirus.versionNumber & Enter, xrefs: 24090DD7
                                                                                                                                                                                                                    • Info = Info & "F" & CountFw & ") " & objFirewall.displayName & " v" & objFirewall.versionNumber & Enter, xrefs: 24090D7F
                                                                                                                                                                                                                    • ", True), xrefs: 24090CE5
                                                                                                                                                                                                                    • Set objSecurityCenter = GetObject("winmgmts:\\.\root\SecurityCenter"), xrefs: 24090C85
                                                                                                                                                                                                                    • CountFW = CountFW + 1, xrefs: 24090D69
                                                                                                                                                                                                                    • objFile.WriteLine(Info), xrefs: 24090E03
                                                                                                                                                                                                                    • For Each objFirewall In colFirewall, xrefs: 24090D53
                                                                                                                                                                                                                    • teste.txt, xrefs: 24090C65
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CountDeleteFindMessageTick$AddressCloseDispatchFirstLibraryLoadProcSleepTranslate
                                                                                                                                                                                                                    • String ID: / $", True)$CountAV = 0$CountAV = CountAV + 1$CountFW = 0$CountFW = CountFW + 1$Enter = Chr(13) + Chr(10)$For Each objAntiVirus In colAntiVirus$For Each objFirewall In colFirewall$Info = Info & "A" & CountAV & ") " & objAntiVirus.displayName & " v" & objAntiVirus.versionNumber & Enter$Info = Info & "F" & CountFw & ") " & objFirewall.displayName & " v" & objFirewall.versionNumber & Enter$Next$Set colAntiVirus = objSecurityCenter.ExecQuery("Select * From AntiVirusProduct",,48)$Set colFirewall = objSecurityCenter.ExecQuery("Select * From FirewallProduct",,48)$Set objFile = objFileSystem.CreateTextFile("$Set objFileSystem = CreateObject("Scripting.fileSystemObject")$Set objSecurityCenter = GetObject("winmgmts:\\.\root\SecurityCenter")$cscript.exe$objFile.Close$objFile.WriteLine(Info)$open$teste.txt$teste.vbs
                                                                                                                                                                                                                    • API String ID: 153418747-372987553
                                                                                                                                                                                                                    • Opcode ID: 90cd02cbcbc54edf0e66bed4de8f3bf98385ee07c0e2b97398f6447681d3d1b1
                                                                                                                                                                                                                    • Instruction ID: d89d2f1234f9cdf823f0317e7b3373685d5fad909fa360fcebee558a7ad2ff9a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 90cd02cbcbc54edf0e66bed4de8f3bf98385ee07c0e2b97398f6447681d3d1b1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D3C17230B0011567FB02FBA4DE80A8E72E59FA5A4CF9084A5E005AF74DCE71DFC25B66
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00027D20,00000000,00000000,?), ref: 240A7EC0
                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 240A7EF2
                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000,?,?,0000000C,00000000), ref: 240A7F08
                                                                                                                                                                                                                    • GetStartupInfoA.KERNEL32(?), ref: 240A7F14
                                                                                                                                                                                                                    • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000105,?,?,0000000C,00000000,?,?,0000000C,00000000), ref: 240A7F58
                                                                                                                                                                                                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?,COMSPEC,?,00000105,?,?,0000000C), ref: 240A7F80
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?,COMSPEC,?,00000105,?,?), ref: 240A7F89
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?,COMSPEC,?,00000105,?), ref: 240A7F92
                                                                                                                                                                                                                    • SetNamedPipeHandleState.KERNEL32(?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?), ref: 240A7FAA
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?), ref: 240A7FB1
                                                                                                                                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 240A7FC1
                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,00001000,?,00000000,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 240A7FEA
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00027D20,00000000,00000000,?), ref: 240A806B
                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,00001000,?,00000000,0000000A,?,00000001,00000000,00000000,?), ref: 240A80B6
                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,240A81C8,00000002,?,00000000,?,00000000,00000000,?,00000000,?,?,00001000,?,00000000,0000000A), ref: 240A80CC
                                                                                                                                                                                                                    • GetExitCodeProcess.KERNEL32(?,00000103), ref: 240A80E8
                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(?,00000000,?,00000103,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF), ref: 240A80FF
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000103,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF,00000010), ref: 240A8108
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,00000103,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF), ref: 240A8111
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateHandle$CloseProcess$FilePipe$CodeExitThreadWrite$EnvironmentInfoNamedReadSleepStartupStateTerminateVariable
                                                                                                                                                                                                                    • String ID: COMSPEC$shellresposta|shellativar|$shellresposta|shelldesativar|$shellresposta|shellresposta|
                                                                                                                                                                                                                    • API String ID: 3902820650-3990598949
                                                                                                                                                                                                                    • Opcode ID: f5636b779ee32b613e387e981bca1cd34434a788dafeec7144c3e71260d09282
                                                                                                                                                                                                                    • Instruction ID: 3c4046b3107c15dcc3a2ae1fd5d572607c9ad845ae8817f673ae9eba1b90e903
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f5636b779ee32b613e387e981bca1cd34434a788dafeec7144c3e71260d09282
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 42814D71A00218AFEB50CBE4CD94FDEB3FCBB58704F5044A5E244F7285EA74AA858F65
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000004,?,?,?,00000000,2409BB82,?,?,00000004,00000000,00000000), ref: 2409B8BD
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2409B8D3
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,00000000,00000000,00000000,00000004,?,?,?,00000000,2409BB82,?,?,00000004), ref: 2409B8E1
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000002,?,?,?,00000000,2409BB82,?,?,00000004,00000000,00000000), ref: 2409B905
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2409BB82), ref: 2409B944
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000000), ref: 2409BA2C
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000004,?,00000004,00000000,00000000,00000000,00000002,?,?,?,00000000,2409BB82), ref: 2409BA67
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000007,00000000,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2409BB82), ref: 2409BB28
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,00000000,00000000,00000000,00000002,?,?,?,00000000,2409BB82,?,?,00000004,00000000,00000000), ref: 2409BB36
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$CloseOpen$Create
                                                                                                                                                                                                                    • String ID: REG_BINARY$REG_DWORD$REG_MULTI_SZ$REG_SZ$clave
                                                                                                                                                                                                                    • API String ID: 2929978649-1504967743
                                                                                                                                                                                                                    • Opcode ID: 2cd09e9f94f797a244f1fe718a4b3c6ac7c9d1cf65a6fd542a4c6694a2b79dc0
                                                                                                                                                                                                                    • Instruction ID: e81f782fc1aaf190416c2c2749039070f2d52063cf36124749886d1abde89794
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2cd09e9f94f797a244f1fe718a4b3c6ac7c9d1cf65a6fd542a4c6694a2b79dc0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72B1F071A00109AFEB00DBA8DA80A9EB7F9FFA8618F504065E510F7358DBB5DE819B51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,?,00000000,00000001,?,00000000,2409B104), ref: 2409ADF4
                                                                                                                                                                                                                    • RegEnumValueA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,00000001,?,00000000), ref: 2409AE34
                                                                                                                                                                                                                    • RegEnumValueA.ADVAPI32(?,?,00000000,00003FFF,00000000,?,00000000,00003FFF,?,?,00000000,?,00000000,?,00000000,?), ref: 2409AE72
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: EnumValue$Open
                                                                                                                                                                                                                    • String ID: (Default)$(Empty)$REG_BINARY$REG_DWORD$REG_DWORD_BIG_ENDIAN$REG_EXPAND_SZ$REG_LINK$REG_MULTI_SZ$REG_NONE$REG_SZ
                                                                                                                                                                                                                    • API String ID: 1214633557-2843546354
                                                                                                                                                                                                                    • Opcode ID: 38117ee3c546fd35aa86a0039f5dd57d0098a737d1b97e35b4f74f4ae6b0593c
                                                                                                                                                                                                                    • Instruction ID: 5b49ce07d2451049c1d1f8a6c77ab4a6e7d94fce958f35691296b21f112929b2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 38117ee3c546fd35aa86a0039f5dd57d0098a737d1b97e35b4f74f4ae6b0593c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3DB13870A0020D9FEB11DB95C980AEEB7F8FF98A14F5040A5E504B7248DB75ABC5AF21
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid, xrefs: 24093E5C
                                                                                                                                                                                                                    • BTMemoryLoadLibary: VirtualAlloc failed, xrefs: 24093EB3
                                                                                                                                                                                                                    • BTMemoryLoadLibary: Can't attach library, xrefs: 24093FCD
                                                                                                                                                                                                                    • BTMemoryLoadLibary: dll dos header is not valid, xrefs: 24093E1F
                                                                                                                                                                                                                    • PE, xrefs: 24093E4B
                                                                                                                                                                                                                    • MZ, xrefs: 24093E12
                                                                                                                                                                                                                    • BTMemoryLoadLibary: BuildImportTable failed, xrefs: 24093F7F
                                                                                                                                                                                                                    • BTMemoryLoadLibary: Get DLLEntyPoint failed, xrefs: 24093FAD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: BTMemoryLoadLibary: BuildImportTable failed$BTMemoryLoadLibary: Can't attach library$BTMemoryLoadLibary: Get DLLEntyPoint failed$BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid$BTMemoryLoadLibary: VirtualAlloc failed$BTMemoryLoadLibary: dll dos header is not valid$MZ$PE
                                                                                                                                                                                                                    • API String ID: 0-3631919656
                                                                                                                                                                                                                    • Opcode ID: 15e5f6abdcdb6756bf99c1043dad4c80285c6775397bf1651ba9658ad5b644de
                                                                                                                                                                                                                    • Instruction ID: 289216240eb34a8f4167da81814e237759fe5a9d1cc9530b671d6969e8fc9e0a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 15e5f6abdcdb6756bf99c1043dad4c80285c6775397bf1651ba9658ad5b644de
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09519471B04205AFEB14CFA9C890F9EB7F5EF98B08F1080A5E604EB395D6B1D9C19B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C599E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CopyFile
                                                                                                                                                                                                                    • String ID: RECYCLER\$RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$[autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$action=Open folder to view files$autorun.inf$icon=shell32.dll,4$label=PENDRIVE$shell\Open=Open$shell\Open\Default=1$shell\Open\command=$shellexecute=
                                                                                                                                                                                                                    • API String ID: 1304948518-631342129
                                                                                                                                                                                                                    • Opcode ID: ffa449084caf68fc0575dfe4ecd59cd691962d0d0ecbd5a99ebb72fc6baba587
                                                                                                                                                                                                                    • Instruction ID: 998a5d1935fd87c3c22fcd0d861d9e39cdddbe94cc483abb85af5cecddb23af8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ffa449084caf68fc0575dfe4ecd59cd691962d0d0ecbd5a99ebb72fc6baba587
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5841FE38A00218EBDB04DB95CAD0E9EB7B5EFA9204F604565F401BB25CDB75AF858F50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetModuleHandleA), ref: 240C4145
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 240C414B
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 240C415E
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 240C4164
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,ExitThread,00000000,kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 240C4177
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 240C417D
                                                                                                                                                                                                                      • Part of subcall function 240C3EC0: VirtualAllocEx.KERNEL32(?,00000000,00000001,00003000,00000040,00000000,240C3F3E,?,?,?,?,00000000,00000000,00000000), ref: 240C3EFC
                                                                                                                                                                                                                      • Part of subcall function 240C3EC0: WriteProcessMemory.KERNEL32(?,00000000,?,00000001,?,?,00000000,00000001,00003000,00000040,00000000,240C3F3E), ref: 240C3F1E
                                                                                                                                                                                                                      • Part of subcall function 240C3F80: CreateRemoteThread.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 240C3FBE
                                                                                                                                                                                                                      • Part of subcall function 240C3F80: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 240C3FCE
                                                                                                                                                                                                                      • Part of subcall function 240C3F80: ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 240C3FE1
                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,kernel32,ExitThread,00000000,kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 240C41BD
                                                                                                                                                                                                                    • GetExitCodeThread.KERNEL32(00000000,?,00000000,000000FF,00000000,kernel32,ExitThread,00000000,kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 240C41C4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressHandleModuleProc$MemoryObjectProcessSingleThreadWait$AllocCodeCreateExitReadRemoteVirtualWrite
                                                                                                                                                                                                                    • String ID: ExitThread$GetModuleHandleA$GetProcAddress$kernel32
                                                                                                                                                                                                                    • API String ID: 3826234517-3123223305
                                                                                                                                                                                                                    • Opcode ID: 065595ddbb8c269451b3a1400048cd839ac7ba014836e2c777c98ec77d79c011
                                                                                                                                                                                                                    • Instruction ID: 50078bb15551c26ecce1bda9e6f7d1bd60cdc05c8707f285a490f662121d9c91
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 065595ddbb8c269451b3a1400048cd839ac7ba014836e2c777c98ec77d79c011
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F4019670A04310B7E3005EBA8C90B5F76C9AFE1118F90493DB954A7289E971D9844BD5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,.txt,2.6,Spy-Net ,240927EC,?,00000000,240927C7), ref: 240926C4
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,.txt,2.6,Spy-Net ,240927EC,?,00000000,240927C7), ref: 240926CC
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000003,00000000,00000000,24092850,24092850,?,2409285C,24092850,?,24092844,?,24092844), ref: 24092768
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000,24092850,24092850,?,2409285C,24092850), ref: 2409277B
                                                                                                                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000), ref: 24092799
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000), ref: 2409279F
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseCreateHandle$PointerWrite
                                                                                                                                                                                                                    • String ID: --- $.txt$2.6$Desktop$Spy-Net
                                                                                                                                                                                                                    • API String ID: 2606874340-3792867649
                                                                                                                                                                                                                    • Opcode ID: 31c68e6bf7aa5223e567f134e594133094464feb89fa7096bc7316d360f983b8
                                                                                                                                                                                                                    • Instruction ID: 7721097ac9171d6dc599bd07c3156d98c0fad7212aa971f3c29bf5518d8a071b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 31c68e6bf7aa5223e567f134e594133094464feb89fa7096bc7316d360f983b8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30414630540208BBFB01D7A1DE91FDEB7F8AB5CB04F514864B5007A199DA75ABC5AA14
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C2F9F
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,240C337E,?,00000000,240C33AD,?,?,?,?,00000011,00000000), ref: 240C2FFE
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,240C337E,?,00000000,240C33AD,?,?,?,?,00000011,00000000), ref: 240C30A7
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C30F1
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,240C337E,?,00000000,240C33AD,?,?,?,?,00000011,00000000), ref: 240C3150
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C319A
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,240C337E,?,00000000,240C33AD,?,?,?,?,00000011,00000000), ref: 240C31F9
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C3243
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,240C337E,?,00000000,240C33AD,?,?,?,?,00000011,00000000), ref: 240C32A2
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C32F2
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C3048
                                                                                                                                                                                                                      • Part of subcall function 24086C78: FindFirstFileA.KERNEL32(00000000,?,00000000,24086CD5,?,00000000), ref: 24086CAD
                                                                                                                                                                                                                      • Part of subcall function 24086C78: FindClose.KERNEL32(00000000,00000000,?,00000000,24086CD5,?,00000000), ref: 24086CB8
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,240C337E,?,00000000,240C33AD,?,?,?,?,00000011,00000000), ref: 240C336F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$AttributesCopy$Find$CloseFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1833752699-0
                                                                                                                                                                                                                    • Opcode ID: 7853e1424e7102555f1f487ab28658d5f14f5bd5c1638d5a18cb4264824208d9
                                                                                                                                                                                                                    • Instruction ID: 4fa53f28c9fba894b8756612d22aebea1911a7e69699207b06c13699f069f998
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7853e1424e7102555f1f487ab28658d5f14f5bd5c1638d5a18cb4264824208d9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9BD1F871D1020CDFEB00EBA4DA80ECDB3B9EF68608F504965E504EB618DF74AEC68B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,?,00000000,00000008,?,00000000,240ABC14,?,?,?,?,00000000,00000000), ref: 240ABA83
                                                                                                                                                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,00000008,?,00000000), ref: 240ABBDB
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,00000008,?), ref: 240ABBEC
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseEnumOpen
                                                                                                                                                                                                                    • String ID: ##@@$DisplayName$NNN$QuietUninstallString$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$UninstallString$YYY
                                                                                                                                                                                                                    • API String ID: 1332880857-2804227269
                                                                                                                                                                                                                    • Opcode ID: 3e6f58b0ccb4ac9992d0f4ed39b15089f4d8de9cb593959f8e19afe106bd4c35
                                                                                                                                                                                                                    • Instruction ID: 06957dce8c2b7e62aa0b57f90f8f96a022d21dc5ceff34241f6d22e6a4540dca
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e6f58b0ccb4ac9992d0f4ed39b15089f4d8de9cb593959f8e19afe106bd4c35
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 89510D30A10119ABEB00DBE5CE90F9EB7F9AF98208F508065E710B7258DEB59EC5CB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 240A72F4
                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 240A73B2
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 240A73C2
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 240A73CD
                                                                                                                                                                                                                    • GetDIBits.GDI32(?,?,00000000,?,?,00000000,00000000), ref: 240A73EF
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 240A7432
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 240A7438
                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 240A743E
                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 240A7452
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Global$Object$AllocBitsDeleteFreeLockReleaseUnlock
                                                                                                                                                                                                                    • String ID: BM
                                                                                                                                                                                                                    • API String ID: 668871282-2348483157
                                                                                                                                                                                                                    • Opcode ID: 52f038e44cb06f74d970198296bf04649677888f4fe7566735cdae7b2124c70a
                                                                                                                                                                                                                    • Instruction ID: da886f7faebb16b71943e0313f2f6de8e8d47642fa340c3e8799d7416ecbfaec
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 52f038e44cb06f74d970198296bf04649677888f4fe7566735cdae7b2124c70a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 59413F716087019FE304DF65C980A5FF7EAEFD8704F40C929F9989B264DB70E9458B92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSecurityInfo.ADVAPI32(00000000,00000006,00000004,00000000,00000000,00000000,00000000), ref: 240C35E5
                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,00000000,00000006,00000004,00000000,00000000,00000000,00000000), ref: 240C35FA
                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,00000000,00000006,00000004,00000000,00000000,00000000,00000000), ref: 240C360B
                                                                                                                                                                                                                    • SetEntriesInAclA.ADVAPI32(00000001,00000000,00000000,?), ref: 240C3651
                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,00000000,00000006,00000004,00000000,00000000), ref: 240C3666
                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,00000000,00000006,00000004,00000000,00000000), ref: 240C3677
                                                                                                                                                                                                                    • SetSecurityInfo.ADVAPI32(00000000,00000006,00000004,00000000,00000000,00000002,00000000,00000000,00000006,00000004,00000000,00000000), ref: 240C368C
                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,00000000,00000006,00000004,00000000,00000000,00000002,00000000,00000000,00000006,00000004,00000000,00000000), ref: 240C36A1
                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,00000000,00000006,00000004,00000000,00000000,00000002,00000000,00000000,00000006,00000004,00000000,00000000), ref: 240C36B2
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FreeLocal$InfoSecurity$Entries
                                                                                                                                                                                                                    • String ID: CURRENT_USER
                                                                                                                                                                                                                    • API String ID: 3140748100-382982459
                                                                                                                                                                                                                    • Opcode ID: e9fa44e2a25c1fc6dfe836d5c7a25ee8ee01b4a8c14e3ced5f094fd89ce84dea
                                                                                                                                                                                                                    • Instruction ID: 3e137d98928a75f09a0eaaa73506ca0d4b6e46ca73d357be3f0c6c1c7d1a3526
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e9fa44e2a25c1fc6dfe836d5c7a25ee8ee01b4a8c14e3ced5f094fd89ce84dea
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B5310870218300EBE711EFB8C981B9FB7D8AB54758F008829F684DB295D7B5D884DB67
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 2408152B
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 24081535
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 24081552
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 2408155C
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 24081585
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 2408158F
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 240815B3
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,24081626,?,?,?,240921A4,00000000,2409223D), ref: 240815BD
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CharNext
                                                                                                                                                                                                                    • String ID: "$"
                                                                                                                                                                                                                    • API String ID: 3213498283-3758156766
                                                                                                                                                                                                                    • Opcode ID: 23fd1d24e031142f26a8683bf247f7775e887043fd7ae20f3809c26a31b61328
                                                                                                                                                                                                                    • Instruction ID: 2a7580cf94a3b1f690fcb24a4d766c03aa3b84f082599c359518f7a41c053aa8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 23fd1d24e031142f26a8683bf247f7775e887043fd7ae20f3809c26a31b61328
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9621D689B483949AEB233AB87FC075AABC94F5B054B5414B5D583CF20BD4708DD6C366
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ExitProcess.KERNEL32(00000000,00000000,2409EBCE), ref: 2409EA5D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitProcess
                                                                                                                                                                                                                    • String ID: EnviarStream$GetChromePass$GetContactList$GetCurrentMSNSettings$GetMSNStatus$Mozilla3_5Password$SetMSNStatus$StartHttpProxy
                                                                                                                                                                                                                    • API String ID: 621844428-2405909186
                                                                                                                                                                                                                    • Opcode ID: a404b835e6daed1c6e54f143fa739e04faee319f0e3fa82022cc2a6e47d66ec9
                                                                                                                                                                                                                    • Instruction ID: 7aeb544832a8aa174b72dac62e0a203f76fad5acb1e482e0d5045d069cf2ae14
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a404b835e6daed1c6e54f143fa739e04faee319f0e3fa82022cc2a6e47d66ec9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3516F70908109EFE701DF65CD90AAFB7F8EB95604B51803AF414F7258D7749EC29BA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240AD15C: RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000001,?,00000000,240AD228), ref: 240AD194
                                                                                                                                                                                                                      • Part of subcall function 240AD15C: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,?,00000000,240AD228), ref: 240AD1B8
                                                                                                                                                                                                                      • Part of subcall function 240AD15C: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001), ref: 240AD1E2
                                                                                                                                                                                                                      • Part of subcall function 240AD15C: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000), ref: 240AD1FC
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(00000000,SteamDecryptDataForThisMachine,?,00000000,?,?,00000000,240AD7AC,?,00000000,240AD7D9,?,?,?,?,00000000), ref: 240AD75A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 240AD760
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: QueryValue$AddressCloseLibraryLoadOpenProc
                                                                                                                                                                                                                    • String ID: /ClientRegistry.Blob$Phrase$Software\Valve\Steam\$SteamDecryptDataForThisMachine$SteamPath$\ClientRegistry.blob$\steam.dll
                                                                                                                                                                                                                    • API String ID: 2859330212-1198945235
                                                                                                                                                                                                                    • Opcode ID: 81e3233183920edc7a3fa08531ad4fd81e51fae6b971ade367757e38d173e238
                                                                                                                                                                                                                    • Instruction ID: 7ae38cb45c58996a72390d055a66d63363250b439ad522d939a38e7d5562ce51
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 81e3233183920edc7a3fa08531ad4fd81e51fae6b971ade367757e38d173e238
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D8416A7460C204DFE708DFE8D9A095EB7AAEB98608F508035F900E7765DA79EDC18F61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 240915AB
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatusEx), ref: 240915BC
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,00000000,GlobalMemoryStatusEx,kernel32.dll), ref: 240915C6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                    • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 145871493-802862622
                                                                                                                                                                                                                    • Opcode ID: a0695eb459c535077ae548e9e53af9f4d317f643c4b0f1d39f5e896fad453542
                                                                                                                                                                                                                    • Instruction ID: 0a62dbc71523b7759abc2a43412b096d0ff9b925c49cc149a12007e2341b379f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a0695eb459c535077ae548e9e53af9f4d317f643c4b0f1d39f5e896fad453542
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CE516474A08702AFE341CF29C58090FFBE1AFC86A4F54C92DB4A8DB254E634D8819F53
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 24081894
                                                                                                                                                                                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 240818B8
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 240818D4
                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000), ref: 240818F5
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 2408191E
                                                                                                                                                                                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 2408192C
                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 24081967
                                                                                                                                                                                                                    • GetFileType.KERNEL32(?,000000F5), ref: 2408197D
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 24081998
                                                                                                                                                                                                                    • GetLastError.KERNEL32(000000F5), ref: 240819B0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1694776339-0
                                                                                                                                                                                                                    • Opcode ID: 2b180cf74916ec880ad05251e60469fa9c92f415ef4b61fec18846a6c2b80774
                                                                                                                                                                                                                    • Instruction ID: af6fbe8e4a86e2c2a61c8292de43e810af8be0a8bc1b7036382199afdcfbc581
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b180cf74916ec880ad05251e60469fa9c92f415ef4b61fec18846a6c2b80774
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BD41D270604701AAF7238F20CB40B667AE5EF407A4F20CE2DD5EA8E5DCE661DDC48756
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 240ADC3D
                                                                                                                                                                                                                    • GetWindow.USER32(00000000,00000005), ref: 240ADC45
                                                                                                                                                                                                                    • GetClassNameA.USER32(00000000,?,00000080), ref: 240ADC5D
                                                                                                                                                                                                                    • GetWindow.USER32(00000000,00000002), ref: 240ADCAE
                                                                                                                                                                                                                      • Part of subcall function 24085948: CharUpperA.USER32(?,00000000,240859BD), ref: 24085986
                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,00000001,Shell_TrayWnd,00000000,00000000,240ADCDA), ref: 240ADC9C
                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,00000000,Shell_TrayWnd,00000000,00000000,240ADCDA), ref: 240ADCA6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Show$CharClassFindNameUpper
                                                                                                                                                                                                                    • String ID: BUTTON$Shell_TrayWnd
                                                                                                                                                                                                                    • API String ID: 1958926019-3627955571
                                                                                                                                                                                                                    • Opcode ID: 8b0ff85a86fa1f5089cf1b6e499f70e2fdd4066b1450d826fdc76876509912b6
                                                                                                                                                                                                                    • Instruction ID: d7cdf926e69d2dbe9030aa19f0f129eb183b16f5aca2322b7b90c4dab91f8401
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8b0ff85a86fa1f5089cf1b6e499f70e2fdd4066b1450d826fdc76876509912b6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1E11E230910639ABE722D7A1CE51B8DB2ABAF55314FC080B0E604E2255EEB09FC54B94
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,Sleep,00000000,240C40C6), ref: 240C4057
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 240C405D
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA,00000000,kernel32,Sleep,00000000,240C40C6), ref: 240C406F
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 240C4075
                                                                                                                                                                                                                      • Part of subcall function 240C3EC0: VirtualAllocEx.KERNEL32(?,00000000,00000001,00003000,00000040,00000000,240C3F3E,?,?,?,?,00000000,00000000,00000000), ref: 240C3EFC
                                                                                                                                                                                                                      • Part of subcall function 240C3EC0: WriteProcessMemory.KERNEL32(?,00000000,?,00000001,?,?,00000000,00000001,00003000,00000040,00000000,240C3F3E), ref: 240C3F1E
                                                                                                                                                                                                                      • Part of subcall function 240C3F80: CreateRemoteThread.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 240C3FBE
                                                                                                                                                                                                                      • Part of subcall function 240C3F80: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 240C3FCE
                                                                                                                                                                                                                      • Part of subcall function 240C3F80: ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 240C3FE1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,kernel32,LoadLibraryA,00000000,kernel32,Sleep,00000000,240C40C6), ref: 240C40A9
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Handle$AddressMemoryModuleProcProcess$AllocCloseCreateObjectReadRemoteSingleThreadVirtualWaitWrite
                                                                                                                                                                                                                    • String ID: LoadLibraryA$Sleep$kernel32
                                                                                                                                                                                                                    • API String ID: 3487503967-1813742806
                                                                                                                                                                                                                    • Opcode ID: 2b2d56cc8905c56ad5f05eb0f5735a35acf31859ae1d2c3f230f34e9a9b6d08e
                                                                                                                                                                                                                    • Instruction ID: 480790db100d9a47ac929a82d14dfae91a54a773c6c127c5d8faca56f83f83c7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b2d56cc8905c56ad5f05eb0f5735a35acf31859ae1d2c3f230f34e9a9b6d08e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C0019270A40604FFE710EBB5CD90B5EB6E8FF55244BA04964E400E3289EA719E849F55
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegEnumValueA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2409BF43,?,00000000,2409BF60), ref: 2409BE4E
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2409BF43), ref: 2409BE74
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2409BE85
                                                                                                                                                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,00002000,00000000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2409BEB9
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2409BED5
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2409BEEE
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,?,?,00000000,00000000,00000200,00000000,?,00002000,00000000), ref: 2409BF08
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2409BF17
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,?,?,00000000,00000000,00000200,00000000,?,00002000,00000000), ref: 2409BF20
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$CloseCreateDeleteEnum
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 925550085-0
                                                                                                                                                                                                                    • Opcode ID: 27bf8121f020eb7f3411d31f37fca5e7f46c6984a8018d078911722d3df7ee77
                                                                                                                                                                                                                    • Instruction ID: fec3bd4944a794073966a9b23eeca109c5e4c5e3a42d2485c6944a08016f6b7e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 27bf8121f020eb7f3411d31f37fca5e7f46c6984a8018d078911722d3df7ee77
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E1410EB1A00209AFEB01DBE9CD90EAFB7FCEF59614F404064F610E7244EB749A459BA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(?,00000000,24093BD1), ref: 24093A62
                                                                                                                                                                                                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 24093BA2
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • BuildImportTable: GetProcAddress failed, xrefs: 24093B7D
                                                                                                                                                                                                                    • BuildImportTable: can't load library: , xrefs: 24093A8E
                                                                                                                                                                                                                    • BuildImportTable: ReallocMemory failed, xrefs: 24093AD6
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadRead
                                                                                                                                                                                                                    • String ID: BuildImportTable: GetProcAddress failed$BuildImportTable: ReallocMemory failed$BuildImportTable: can't load library:
                                                                                                                                                                                                                    • API String ID: 1452896035-1384308123
                                                                                                                                                                                                                    • Opcode ID: 4c0af039fd6833e171a22ba7bb159c3707043b82e20b8ec8e456feeba6b00052
                                                                                                                                                                                                                    • Instruction ID: a7b9b770106d648b09891defcc64f26ce9ae94d833b3851930893045ed427989
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4c0af039fd6833e171a22ba7bb159c3707043b82e20b8ec8e456feeba6b00052
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1E515A70A04219AFDB00CBA8C884B8DB7F4BF49718F4085A5E614EB345D7B5EAC0DF91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CleanupStartupinet_addr
                                                                                                                                                                                                                    • String ID: 127.0.0.1$localhost
                                                                                                                                                                                                                    • API String ID: 4189620951-2339935011
                                                                                                                                                                                                                    • Opcode ID: dcbd08e5f9fa169b99d992ae179d76779de6fc8bb296d15d46536b693c465828
                                                                                                                                                                                                                    • Instruction ID: 23649bf1d0129fa191e7a1232a44a662d607ade8bdc80fd8e4926d9ad4904f61
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dcbd08e5f9fa169b99d992ae179d76779de6fc8bb296d15d46536b693c465828
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9C112B317492055BF700BAF84E90ADE72DC9FACE18B404575E604D7249E9B1EED076D2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000032,?,00000000,240B31F8,?,?,?,?,00000000,00000000), ref: 240B2E74
                                                                                                                                                                                                                      • Part of subcall function 240B2DC8: GetTickCount.KERNEL32 ref: 240B3070
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountSleepTick
                                                                                                                                                                                                                    • String ID: *.*$.tmp$ALL$p2$
                                                                                                                                                                                                                    • API String ID: 2804873075-3928342550
                                                                                                                                                                                                                    • Opcode ID: e2b43b394ed9f13856fdb9805985c26f1fb496d268bda17db7f60f38497ed00e
                                                                                                                                                                                                                    • Instruction ID: 71a9b137e69164ecfebc57fb0d6f625ded1376fcdd2b78547e12fad4fc6116e1
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e2b43b394ed9f13856fdb9805985c26f1fb496d268bda17db7f60f38497ed00e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 99B17330A002199FEB11DB50DD90AEEB3B9EFD5308F6085B5D844A7358DA72EEC58F54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindow.USER32(00000000), ref: 240AF51F
                                                                                                                                                                                                                    • SetPropA.USER32(?,OBJECT), ref: 240AF532
                                                                                                                                                                                                                    • SetWindowLongA.USER32(?,000000FC,Function_0002F404), ref: 240AF542
                                                                                                                                                                                                                    • SetPropA.USER32(?,WNDPROC,00000000), ref: 240AF551
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: PropWindow$Long
                                                                                                                                                                                                                    • String ID: OBJECT$WNDPROC
                                                                                                                                                                                                                    • API String ID: 109861939-55689305
                                                                                                                                                                                                                    • Opcode ID: 87777fa06dafe0f9eb6d708f20e214870df498e0a4e69fd58e8294ea721fbee4
                                                                                                                                                                                                                    • Instruction ID: bd83e5fbbebe20af2b15a275a6ea5f7727fe44cc01203833ef98e9790901c855
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 87777fa06dafe0f9eb6d708f20e214870df498e0a4e69fd58e8294ea721fbee4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 36317E72A00254AFDB00DFE9CC84D6EB7F9EB4D2147508164BA19EB348DB74ED858FA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowTextA.USER32(?,00000000,00000000), ref: 240B2A8E
                                                                                                                                                                                                                    • IsWindowVisible.USER32(?), ref: 240B2A9E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$TextVisible
                                                                                                                                                                                                                    • String ID: *@*@$2$$2$
                                                                                                                                                                                                                    • API String ID: 1670992164-2096466498
                                                                                                                                                                                                                    • Opcode ID: 51233afb7dfc9e220b8ddc65e4ebc32b0ec84b974e6ca0dd454ebcdb605c0746
                                                                                                                                                                                                                    • Instruction ID: 4cc34d3340b6e8fe0cb622241a57c13b2d48b6fad0fba08ed429ddc4c24fcdc7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 51233afb7dfc9e220b8ddc65e4ebc32b0ec84b974e6ca0dd454ebcdb605c0746
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5F219271A00204FBFB02DEA0CD94F9EB7ADEB98304F508479B540BA158DE76DF859A19
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24081644: GetSystemTime.KERNEL32(?), ref: 2408164E
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 240875E3
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 240875F0
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000), ref: 24087605
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000), ref: 2408761E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000), ref: 24087624
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 24087638
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 2408763E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseHandleTime$Create$System
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1407650207-0
                                                                                                                                                                                                                    • Opcode ID: 6e6faca18b4a07bafc50e29083063f6a279406abf546a134a9a2ead300da553b
                                                                                                                                                                                                                    • Instruction ID: defe575dc02cb402623c79baea2cacba7077927c404e5911605ef29713e6f20a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6e6faca18b4a07bafc50e29083063f6a279406abf546a134a9a2ead300da553b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A521A2B5900608BAF751E7B4DE91F9E73ECEF58218F504561B220E61C9EB74AB808B64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(ntdll.dll,240C394B,240CB980,?,240C3A12,240C6642,SQLite3.dll,240C67CC,?,logs.dat,240C67CC,?,00000000,00000000,Function_000451BC,00000000), ref: 240C3531
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,RtlInitUnicodeString), ref: 240C3552
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,ZwOpenSection), ref: 240C3567
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                                                                                                                    • String ID: RtlInitUnicodeString$ZwOpenSection$ntdll.dll
                                                                                                                                                                                                                    • API String ID: 2238633743-2527063403
                                                                                                                                                                                                                    • Opcode ID: 37c21e1219cea5c1dbaa46dd41b9c3193d6137d2f67d6b2dc3aa1cb10d12af2f
                                                                                                                                                                                                                    • Instruction ID: c664dd39ab4d4f66c659da503431cdc2f5558c5d7b827dfae8ffc6453f335cc2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 37c21e1219cea5c1dbaa46dd41b9c3193d6137d2f67d6b2dc3aa1cb10d12af2f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8FE042B1925600EFE700AFB7EB54B4D77E5FB55609B800479F000A7A48D77D85C4AF64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020006,?,?,?,?,00000000,2409B63D,?,?,00000003,00000000,00000000), ref: 2409B4CE
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2409B4F1
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2409B63D,?,?,00000003,00000000), ref: 2409B615
                                                                                                                                                                                                                      • Part of subcall function 2409A9BC: RegOpenKeyExA.ADVAPI32(00000000,?,00000000,?,00000000,00000008,?,00000000,2409AB1D), ref: 2409AA71
                                                                                                                                                                                                                      • Part of subcall function 2409A9BC: RegEnumKeyExA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,00000008,?,00000000), ref: 2409AAD4
                                                                                                                                                                                                                      • Part of subcall function 2409A9BC: RegCloseKey.ADVAPI32(?,?,00000001,00000000,000000FF,00000000,00000000,00000000,?,?,00000000,00000000,000000FF,00000000,00000000,00000000), ref: 2409AAE1
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2409B58E
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000002,?,?,?,00000000,2409B63D,?,?,00000003,00000000,00000000), ref: 2409B5F5
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2409B63D,?,?,00000003,00000000,00000000), ref: 2409B607
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: DeleteOpen$Close$EnumValue
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1347035672-0
                                                                                                                                                                                                                    • Opcode ID: 583e60665d961682124b60f4dcfa3dd95171d65c95d0a9a66b583e55ca2c5dcc
                                                                                                                                                                                                                    • Instruction ID: d47bf657650219becaf530ef6559b45d625d41199bb922edc9fb0bc8f69896d5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 583e60665d961682124b60f4dcfa3dd95171d65c95d0a9a66b583e55ca2c5dcc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 55612271A001099BEB00EBB8DE80AEFB7F9FFA8718F504464E514E7358DA75ED849B50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,?,00000000,0002001B,?,?,00000000,2409BD96,?,?,?,?,00000000,00000000), ref: 2409BCEF
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00000000,?,00000000,0002001B,?,?,00000000,2409BD96), ref: 2409BD09
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,00000000,00000000,?,00000000), ref: 2409BD2C
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?,?,00000000,?), ref: 2409BD48
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 2409BD56
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,00000000,00000000,?,00000000,0002001B,?,?,00000000,2409BD96,?,?,?,?,00000000,00000000), ref: 2409BD6E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$Query$CloseDeleteOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2877093821-0
                                                                                                                                                                                                                    • Opcode ID: 7c1902bea89f0d04c9cd822cb9671a9471aa2f89d831d1575e33e155ad22e0b6
                                                                                                                                                                                                                    • Instruction ID: 15e835bab1706bb426aa7ce59afc375d03995a411dcfd43861ad94f495f3a83a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c1902bea89f0d04c9cd822cb9671a9471aa2f89d831d1575e33e155ad22e0b6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 46410375A00118ABEB01DAE4DE80EEFB7FCFF58654F104566F900E7254EA75DE418B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24081644: GetSystemTime.KERNEL32(?), ref: 2408164E
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 240875E3
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 240875F0
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000), ref: 24087605
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000), ref: 2408761E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000), ref: 24087624
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 24087638
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,24087659), ref: 2408763E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseHandleTime$Create$System
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1407650207-0
                                                                                                                                                                                                                    • Opcode ID: 63501a43027af43f614ad4127fa1e25b5d42fbf61b6743d9f9c404312c26d417
                                                                                                                                                                                                                    • Instruction ID: 08d2463b1c87647f1ffebddce421f61cd15af52b76f7b731561e6e17aa6ea093
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 63501a43027af43f614ad4127fa1e25b5d42fbf61b6743d9f9c404312c26d417
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9911D3B0A00604BEF752A774DE92F9E77ACDF55218F5002A1F210EA5CAEB746B808B14
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenClipboard.USER32 ref: 240ACF15
                                                                                                                                                                                                                    • GetClipboardData.USER32(00000001), ref: 240ACF32
                                                                                                                                                                                                                    • GlobalSize.KERNEL32(00000000), ref: 240ACF52
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 240ACF5C
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 240ACF7D
                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 240ACFAD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClipboardGlobal$CloseDataLockOpenSizeUnlock
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1964585863-0
                                                                                                                                                                                                                    • Opcode ID: b7e63763716d6febe711de75023821c7665a7f99896b9c68bc00e12aa85193c6
                                                                                                                                                                                                                    • Instruction ID: 397231d076c0b4d2a41ee97938d5943932be0f794765c80450215bbc37a6cab1
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b7e63763716d6febe711de75023821c7665a7f99896b9c68bc00e12aa85193c6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CD11E930908208BFEB01DBF9CD61B5EB7F9EB59314F9244B1E904D3644DA769E40DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 240C0124
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 240C0162
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,.txt,?,?,00000000,240C02D7,?,?,00000000,00000000), ref: 240C016D
                                                                                                                                                                                                                      • Part of subcall function 24092134: InternetOpenA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 240921C0
                                                                                                                                                                                                                      • Part of subcall function 24092134: InternetConnectA.WININET(00000000,00000000,?,00000000,00000000,00000001,08000000,00000000), ref: 240921F8
                                                                                                                                                                                                                      • Part of subcall function 240923C4: FtpOpenFileA.WININET(?,00000000,40000000,00000002,00000000), ref: 24092431
                                                                                                                                                                                                                      • Part of subcall function 240923C4: InternetWriteFile.WININET(00000000,?,00000001,?), ref: 2409248F
                                                                                                                                                                                                                      • Part of subcall function 240923C4: InternetCloseHandle.WININET(00000000), ref: 240924DE
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileInternet$Open$AttributesCloseConnectCopyCountHandleTickWrite
                                                                                                                                                                                                                    • String ID: .txt$___
                                                                                                                                                                                                                    • API String ID: 3003208719-4103982732
                                                                                                                                                                                                                    • Opcode ID: 5dfa8de22cbfc580b6aff7469bfcb0a0c10e777afac64a1dfaf2b84f8725ef9b
                                                                                                                                                                                                                    • Instruction ID: 18eb08169823c221048784f302c0c76dabb365d347abb1c5a3a84471ffebf43d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5dfa8de22cbfc580b6aff7469bfcb0a0c10e777afac64a1dfaf2b84f8725ef9b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC511A30A00209EFEB01DFE4CE90F9D77BAEBA8208F514475E540A7259CA79AEC5DF51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00002710,?,240A84EC,?,240A84EC,?,00000000,240A84A4,?,?,?,?,00000000,00000000), ref: 240A837F
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 240A83F3
                                                                                                                                                                                                                    • Sleep.KERNEL32(00002710,00000000,240A847A,?,?,240A84EC,?,240A84EC,?,00002710,?,240A84EC,?,240A84EC,?,00000000), ref: 240A8468
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep$CountTick
                                                                                                                                                                                                                    • String ID: XXXXXXXXXXXXXXXXXXXX$XxX.xXx
                                                                                                                                                                                                                    • API String ID: 207069750-1553977181
                                                                                                                                                                                                                    • Opcode ID: 19caaf702ff723324f8177038729b826c716f314a3de33f26a98f832d93d6796
                                                                                                                                                                                                                    • Instruction ID: ae41797b65ab05891077b403d3376d4132e26415975e7d24e5b0ff82c51aff3e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 19caaf702ff723324f8177038729b826c716f314a3de33f26a98f832d93d6796
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D7419832A04118EBEF01DBE4CE90A9EB7B5FF94708F518475E600A7258DB35DEC18B99
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetPropA.USER32(?,WNDPROC), ref: 240AF41C
                                                                                                                                                                                                                    • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 240AF429
                                                                                                                                                                                                                    • GetPropA.USER32(?,OBJECT), ref: 240AF437
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Prop$CallProcWindow
                                                                                                                                                                                                                    • String ID: OBJECT$WNDPROC
                                                                                                                                                                                                                    • API String ID: 1345539330-55689305
                                                                                                                                                                                                                    • Opcode ID: 76e0079f64b9836f4116b145812a56fe7655249bbcd4e090df4ef25165a8cbe7
                                                                                                                                                                                                                    • Instruction ID: 181a9a1b04bf33b57293f3b8d022d6dff573b0f8b5edb37c73b0a3a030b9709a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 76e0079f64b9836f4116b145812a56fe7655249bbcd4e090df4ef25165a8cbe7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C0156B2A00219BB9B00DFE5CD84D9FBBFDEF85250B108165BA45A7214DB30DE40CBB1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • 6ED92200.AVICAP32(Video,50000000,00000000,00000000,00000280,000001E0,?,00000001,240B9038,000003E8,000003E8,240BE184,webcamgetbuffer,240BE184,webcam,240BE184), ref: 240AB644
                                                                                                                                                                                                                    • SendMessageA.USER32(?,0000040B,00000000,00000000), ref: 240AB65D
                                                                                                                                                                                                                    • UnregisterClassA.USER32(MainForm,?), ref: 240AB674
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassD92200MessageSendUnregister
                                                                                                                                                                                                                    • String ID: MainForm$Video
                                                                                                                                                                                                                    • API String ID: 3398403615-2964836702
                                                                                                                                                                                                                    • Opcode ID: 6d4ca4c496f57578f9c51d2b9f4f92d15ef8f214937fa8ae7997e4ab0c787c79
                                                                                                                                                                                                                    • Instruction ID: 31e5bb2443cdf2cfaa2c403d23465310631616878277636aaba1f1292687c6a2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6d4ca4c496f57578f9c51d2b9f4f92d15ef8f214937fa8ae7997e4ab0c787c79
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 53E002B1A84350BFF650DEA5CD9AF5936A8D718B0CFA44420F704BA5D4D6ACA6C08F18
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00002000,00000001), ref: 240C45EB
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,00002000,00000001), ref: 240C4611
                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,00001000,00000004,?,?,00002000,00000001), ref: 240C463B
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,00000002,?,?,?,00001000,00000004,?,?,00002000,00000001), ref: 240C4693
                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,?,00000000,?,00000001), ref: 240C4756
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$Alloc$Protect
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 655996629-0
                                                                                                                                                                                                                    • Opcode ID: 71fd94f1d6dd89743921dfd707dda38dcf47078e3fa1528d19890e204c93d93b
                                                                                                                                                                                                                    • Instruction ID: 4ea02bdc345c46f888c73298efa50483ad1eab6e96d107ae7dba5571ad76b47c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 71fd94f1d6dd89743921dfd707dda38dcf47078e3fa1528d19890e204c93d93b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD71CF75A10208EFDB01CFA8C980EAEB7F9FF88314F158165E904EB255D670EE84CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,audio,240B22BC,240B22BC,resposta,|Y|,00000000,240B20D2,?,00000000,240B2222,?,00000000,240B2284), ref: 240B20E1
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID: audio$audiogetbuffer$resposta$|Y|
                                                                                                                                                                                                                    • API String ID: 3472027048-441611841
                                                                                                                                                                                                                    • Opcode ID: 418453175a443c245e9e8c8a1688774a02486f28989f9f0e62759e243acdb2a1
                                                                                                                                                                                                                    • Instruction ID: 72abcc6f8586169c1469c914eb67bc7973a5da05e5c86ab304aaa0139346d91d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 418453175a443c245e9e8c8a1688774a02486f28989f9f0e62759e243acdb2a1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9F513738A00205EFD301DF64D994AAAB7F0FB6D704B518979FC44AB314E7B999C8CB48
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,240AB060,?,?,240AB060,240CB98C,240AB060,resposta,|Y|,240CB8DC,00000000,240AB027), ref: 240AAECC
                                                                                                                                                                                                                      • Part of subcall function 24092B24: getpeername.WS2_32(?,?), ref: 24092B3B
                                                                                                                                                                                                                      • Part of subcall function 24092B24: inet_ntoa.WS2_32(?), ref: 24092B44
                                                                                                                                                                                                                      • Part of subcall function 24092B58: getpeername.WS2_32(?,?), ref: 24092B6C
                                                                                                                                                                                                                      • Part of subcall function 24092B58: htons.WS2_32(?), ref: 24092B77
                                                                                                                                                                                                                      • Part of subcall function 24092908: socket.WS2_32(00000002,00000001,00000006), ref: 24092959
                                                                                                                                                                                                                      • Part of subcall function 24092908: htons.WS2_32 ref: 24092968
                                                                                                                                                                                                                      • Part of subcall function 24092908: inet_addr.WS2_32(?), ref: 24092975
                                                                                                                                                                                                                      • Part of subcall function 24092908: gethostbyname.WS2_32(?), ref: 240929A2
                                                                                                                                                                                                                      • Part of subcall function 24092908: connect.WS2_32(00000002,00000002,00000010), ref: 240929CD
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,00000000,240AB027), ref: 240AAE54
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000001,00000000,240AAFAD,?,000003E8,240AB060,?,?,240AB060,240CB98C,240AB060,resposta,|Y|,240CB8DC,00000000,240AB027), ref: 240AAF33
                                                                                                                                                                                                                      • Part of subcall function 24092CEC: send.WSOCK32(?,00000000,00000000,00000000,00000000,00000000,24092D4C,?,00000000,240A8FD9,240A9060,240A9054,?,00000000,240A9016), ref: 24092CF8
                                                                                                                                                                                                                      • Part of subcall function 24092CEC: WSAGetLastError.WS2_32(?,00000000,00000000,00000000,00000000,00000000,24092D4C,?,00000000,240A8FD9,240A9060,240A9054,?,00000000,240A9016), ref: 24092D04
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep$getpeernamehtons$ErrorLastconnectgethostbynameinet_addrinet_ntoasendsocket
                                                                                                                                                                                                                    • String ID: resposta$|Y|
                                                                                                                                                                                                                    • API String ID: 3039588340-3743483372
                                                                                                                                                                                                                    • Opcode ID: f6028a0d7f37781e80f3babd1c38907dc2bcc6d34c89045be92934f4f0b51d50
                                                                                                                                                                                                                    • Instruction ID: 4c6f5b1c1e77791307a51af83e962bbd36f9a4bb6d363b6c7c1bc29d0cd63443
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f6028a0d7f37781e80f3babd1c38907dc2bcc6d34c89045be92934f4f0b51d50
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B7516C70A00228DFEB11DF95CD90ACEB7F5FF59304F4084A5E644AA294DB709ED19F91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24092A38: shutdown.WS2_32(?,00000002), ref: 24092A83
                                                                                                                                                                                                                      • Part of subcall function 24092A38: closesocket.WS2_32(?), ref: 24092AB1
                                                                                                                                                                                                                    • socket.WS2_32(00000002,00000001,00000006), ref: 24092959
                                                                                                                                                                                                                    • htons.WS2_32 ref: 24092968
                                                                                                                                                                                                                    • inet_addr.WS2_32(?), ref: 24092975
                                                                                                                                                                                                                    • gethostbyname.WS2_32(?), ref: 240929A2
                                                                                                                                                                                                                    • connect.WS2_32(00000002,00000002,00000010), ref: 240929CD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: closesocketconnectgethostbynamehtonsinet_addrshutdownsocket
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1626636048-0
                                                                                                                                                                                                                    • Opcode ID: 3642ef4c80f895db98b058736c7e7442fc531f55961e66d2d2d515cd1be5f6cd
                                                                                                                                                                                                                    • Instruction ID: 39a387d5771d69be1492c88a8657ab51f14d6ffdb36a2a1e64fd0745c1cee107
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3642ef4c80f895db98b058736c7e7442fc531f55961e66d2d2d515cd1be5f6cd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5631B1315043449FEB11CF64DD60A5BBBE8EB0EB14B524CADE800DF255E774DA90EBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000,240C5EB7), ref: 240C5E37
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(001F0FFF,00000000,?,00000000,240C5EB7), ref: 240C5E50
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,001F0FFF,00000000,?,00000000,240C5EB7), ref: 240C5E78
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,001F0FFF,00000000,?,00000000,240C5EB7), ref: 240C5E8B
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064,00000000,00000000,001F0FFF,00000000,?,00000000,240C5EB7), ref: 240C5E92
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseHandleProcess$CurrentOpenSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4261582699-0
                                                                                                                                                                                                                    • Opcode ID: d99f670b8388d24fca246b3e83c3e05724f737e24291141fd26cbc3ddd875358
                                                                                                                                                                                                                    • Instruction ID: f124adc55113cf289ed9643db4eff7313dfe51f4299e53a7792c1510ca69815f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d99f670b8388d24fca246b3e83c3e05724f737e24291141fd26cbc3ddd875358
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7511BF30600619EBE700DB6ADD80A4FB7EAAF65608F504570A804E7649EF70BEC18A95
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876C7
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876DC
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000), ref: 240876EA
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000), ref: 240876F8
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876FE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Time$CloseCreateHandle
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 670991709-0
                                                                                                                                                                                                                    • Opcode ID: a519130655b6d95c4d9f5b3718da5a45d2f68339c62413270bc36a0067575381
                                                                                                                                                                                                                    • Instruction ID: 474f47bc4311fff77f062d58bd1f3355e3bb1e74d83aa06a54d8bd86b87c2b2a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a519130655b6d95c4d9f5b3718da5a45d2f68339c62413270bc36a0067575381
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D811A5B4A50704BFF710D774DE92F9EB3ECEB54708F600461B610EA1C9EB74AA808B24
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876C7
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876DC
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000), ref: 240876EA
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000), ref: 240876F8
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,24087719), ref: 240876FE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Time$CloseCreateHandle
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 670991709-0
                                                                                                                                                                                                                    • Opcode ID: 0ff348dce1ccf7c1ffa9716afc15dd2b907dec58a60113d87beeb340d0fe3ea5
                                                                                                                                                                                                                    • Instruction ID: d07e282468f8e98748de2187c5a6b8ba8ea62d2fdcc3bb5d355a2da604dff4cb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0ff348dce1ccf7c1ffa9716afc15dd2b907dec58a60113d87beeb340d0fe3ea5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9211C8B4A50704BFF710D774DE92F9EB3ECEB54708F600461B610EA1C9EB74AA808B24
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24092908: socket.WS2_32(00000002,00000001,00000006), ref: 24092959
                                                                                                                                                                                                                      • Part of subcall function 24092908: htons.WS2_32 ref: 24092968
                                                                                                                                                                                                                      • Part of subcall function 24092908: inet_addr.WS2_32(?), ref: 24092975
                                                                                                                                                                                                                      • Part of subcall function 24092908: gethostbyname.WS2_32(?), ref: 240929A2
                                                                                                                                                                                                                      • Part of subcall function 24092908: connect.WS2_32(00000002,00000002,00000010), ref: 240929CD
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,00000000,240A7E17,?,?,?,?,00000000,00000000), ref: 240A7D73
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,0000000A,00000000,240A7E17,?,?,?,?,00000000,00000000), ref: 240A7DBD
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000EA60,000003E8,0000000A,00000000,240A7E17,?,?,?,?,00000000,00000000), ref: 240A7DF5
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep$connectgethostbynamehtonsinet_addrsocket
                                                                                                                                                                                                                    • String ID: resposta$|Y|
                                                                                                                                                                                                                    • API String ID: 1101491793-3743483372
                                                                                                                                                                                                                    • Opcode ID: 84a2ab28377dd7ba5dadcb1253d604ab3442f10b5a63d6beda17bacdb9a414a2
                                                                                                                                                                                                                    • Instruction ID: 9fe1a575c0b5e28d2a65f93ce4c223c83440f016920e7837adec15606e348feb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 84a2ab28377dd7ba5dadcb1253d604ab3442f10b5a63d6beda17bacdb9a414a2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A0116D30304658BBE701DBA5CDB0F1E77AAE79DA0CF108435FA00A7668C979FED09A51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(?,00000000,?), ref: 2409C022
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2409C039
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,00000000,2409C081), ref: 2409C051
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,2409C081), ref: 2409C05A
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2409C061
                                                                                                                                                                                                                      • Part of subcall function 2409BDD4: RegEnumValueA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2409BF43,?,00000000,2409BF60), ref: 2409BE4E
                                                                                                                                                                                                                      • Part of subcall function 2409BDD4: RegSetValueExA.ADVAPI32(?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2409BF43), ref: 2409BE74
                                                                                                                                                                                                                      • Part of subcall function 2409BDD4: RegDeleteValueA.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2409BE85
                                                                                                                                                                                                                      • Part of subcall function 2409BDD4: RegEnumKeyExA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,00002000,00000000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2409BEB9
                                                                                                                                                                                                                      • Part of subcall function 2409BDD4: RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2409BED5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$CloseCreateDeleteEnum$Open
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3917402359-0
                                                                                                                                                                                                                    • Opcode ID: 2cfa936f3781f50e30025cdda06e8d1a38946700d607faacb60b6fef6b958f93
                                                                                                                                                                                                                    • Instruction ID: eaa79a23e3a82807ad1dd3d205b30943200442606dee25d4349295ef8581bbec
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2cfa936f3781f50e30025cdda06e8d1a38946700d607faacb60b6fef6b958f93
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7C115EB1D04218BFEB10DBA8DE80DAFB7FCEF99214F504564B404E3204F635AE808A20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(00000000,2409E8B6,?,?,?,?,00000010,00000000,00000000), ref: 2409E51E
                                                                                                                                                                                                                      • Part of subcall function 2409DD70: WSAStartup.WS2_32(00000101,?), ref: 2409DDB0
                                                                                                                                                                                                                      • Part of subcall function 2409DD70: inet_addr.WS2_32(00000000), ref: 2409DDCF
                                                                                                                                                                                                                      • Part of subcall function 2409DD70: WSACleanup.WS2_32 ref: 2409DDDD
                                                                                                                                                                                                                      • Part of subcall function 2409DD70: gethostbyaddr.WS2_32(000000FF,00000004,00000002), ref: 2409DDF1
                                                                                                                                                                                                                      • Part of subcall function 2409DD70: WSACleanup.WS2_32 ref: 2409DE12
                                                                                                                                                                                                                      • Part of subcall function 24083790: SysFreeString.OLEAUT32(?), ref: 240837A3
                                                                                                                                                                                                                      • Part of subcall function 24083778: SysFreeString.OLEAUT32(?), ref: 24083786
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CleanupFreeString$CurrentProcessStartupgethostbyaddrinet_addr
                                                                                                                                                                                                                    • String ID: TCP$UDP$Unknown
                                                                                                                                                                                                                    • API String ID: 3668935989-2456960297
                                                                                                                                                                                                                    • Opcode ID: 1b8aae6a5c1c1070b787d77d1874a8c8f201b08bc2131d869af6fa3b045fb1fc
                                                                                                                                                                                                                    • Instruction ID: 5640acf666d47eac51ecf7c530204bae02fdedf2b58aff29e1517f979918340d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1b8aae6a5c1c1070b787d77d1874a8c8f201b08bc2131d869af6fa3b045fb1fc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DAB1E97090010DEBEB10DB94CA90ADEBBFAFF94704F108565E504B7298DA71AEC5EF91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountTick
                                                                                                                                                                                                                    • String ID: *.*$.tmp$t2$
                                                                                                                                                                                                                    • API String ID: 536389180-2833573020
                                                                                                                                                                                                                    • Opcode ID: e4c2ce4138a1a12d98507f060a2dc6faa79225f874bcfc3b4c416a6f46cecfed
                                                                                                                                                                                                                    • Instruction ID: 69949716a6f8fb7db98a3761da48dc090e199df8a2075524b4a2d37d34985732
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e4c2ce4138a1a12d98507f060a2dc6faa79225f874bcfc3b4c416a6f46cecfed
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1F5182309082189FEB15DB60DD90BDEBBB5EB94304F5080F5D848A3358DB76AEC5CE54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • WNetOpenEnumA.MPR(00000002,00000000,00000000,?,?), ref: 240B074D
                                                                                                                                                                                                                    • WNetEnumResourceA.MPR(?,FFFFFFFF,?,00004020), ref: 240B0890
                                                                                                                                                                                                                    • WNetCloseEnum.MPR(?), ref: 240B08AE
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Enum$CloseOpenResource
                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                    • API String ID: 1269649575-2726393805
                                                                                                                                                                                                                    • Opcode ID: e764723832160ce069e0404891016595f1bd0836363b692b315b21e98dab449b
                                                                                                                                                                                                                    • Instruction ID: 155cd0891e7e81360f12465e4c1e72a344a7bfdb02a6bc5145304076e92ad930
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e764723832160ce069e0404891016595f1bd0836363b692b315b21e98dab449b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9D419FB1A00219AFEB118F55CD80F4EB7B9FB84344F1044E5EFC8B6248D6759BC08E99
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExA.KERNEL32(240D3704), ref: 240C36E3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Version
                                                                                                                                                                                                                    • String ID: \Device\PhysicalMemory
                                                                                                                                                                                                                    • API String ID: 1889659487-2007344781
                                                                                                                                                                                                                    • Opcode ID: 1ba3d8746b2f18273e836e2a24958028e664d4ba8c7bb483cf3c1c02ac976cb3
                                                                                                                                                                                                                    • Instruction ID: e95d14ec48185fe92c14aa6c0d56f5f20cb4b9c0fe6488dcbbbc2907a46db1fd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1ba3d8746b2f18273e836e2a24958028e664d4ba8c7bb483cf3c1c02ac976cb3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6E213CB1664201EFD360CF76DA84F4E7AE9EB08648F108939F505D6640E7BCD5C48F6A
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240815E0: GetModuleFileNameA.KERNEL32(00000000,?,00000105,?,?,?,240921A4,00000000,2409223D,?,?,?,?,00000000,00000000,00000000), ref: 24081604
                                                                                                                                                                                                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 240AB439
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 240AB43F
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000,240AB4AE), ref: 240AB44F
                                                                                                                                                                                                                      • Part of subcall function 240AB308: VirtualAllocEx.KERNEL32(00000000,00000000,00000000,00003000,00000040), ref: 240AB320
                                                                                                                                                                                                                      • Part of subcall function 240AB308: VirtualProtectEx.KERNEL32(00000000,00000000,00000000,00000040,00000040,00000000,00000000,00000000,00003000,00000040), ref: 240AB331
                                                                                                                                                                                                                      • Part of subcall function 240AB308: WriteProcessMemory.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000040,00000040,00000000,00000000,00000000,00003000,00000040), ref: 240AB33F
                                                                                                                                                                                                                      • Part of subcall function 240AB354: GetModuleHandleA.KERNEL32(00000000), ref: 240AB36C
                                                                                                                                                                                                                      • Part of subcall function 240AB354: VirtualFreeEx.KERNEL32(00000000,?,00000000,00008000,?,00000000), ref: 240AB396
                                                                                                                                                                                                                      • Part of subcall function 240AB354: VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 240AB3A5
                                                                                                                                                                                                                      • Part of subcall function 240AB354: GetModuleHandleA.KERNEL32(00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 240AB3B8
                                                                                                                                                                                                                      • Part of subcall function 240AB354: WriteProcessMemory.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 240AB3C0
                                                                                                                                                                                                                      • Part of subcall function 240AB354: CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000), ref: 240AB3E1
                                                                                                                                                                                                                      • Part of subcall function 240AB354: CloseHandle.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 240AB3E7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ProcessVirtual$HandleModule$AllocMemoryThreadWindowWrite$CloseCreateFileFindFreeNameOpenProtectRemote
                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                    • API String ID: 1977168033-2988720461
                                                                                                                                                                                                                    • Opcode ID: 06e6e90431da5b76e2caccc9960f85bcd6c8ab87150ba096d59ddf79d1dfb919
                                                                                                                                                                                                                    • Instruction ID: 680496e033d8f1ea4a12137a47a84bcf9d3929d6efd683d5628fc716b9fba340
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06e6e90431da5b76e2caccc9960f85bcd6c8ab87150ba096d59ddf79d1dfb919
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D9119171B00218AFEB01DBF4CC90BAEB7B9EF49204F504535A711E7348EA74DE408B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(urlmon.dll,URLDownloadToFileA,00000000,24086200), ref: 240861CD
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,urlmon.dll), ref: 240861D3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: URLDownloadToFileA$urlmon.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-892269089
                                                                                                                                                                                                                    • Opcode ID: a587342a24a95de404dce28bbafcdb1d47d991acbb5f39d8eefea3e77c969e69
                                                                                                                                                                                                                    • Instruction ID: be0ea41c447e3f95023450b2ff8d5a427c325b79569125c10aaf676f098bff0b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a587342a24a95de404dce28bbafcdb1d47d991acbb5f39d8eefea3e77c969e69
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CAF0C270108A44BFE701CBE6DEA0D5E7BFCEF8E61075288E5F404D3215D5346E409BA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(urlmon.dll,URLDownloadToFileA,00000000,24086200), ref: 240861CD
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,urlmon.dll), ref: 240861D3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: URLDownloadToFileA$urlmon.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-892269089
                                                                                                                                                                                                                    • Opcode ID: 1468099460f9f41eec5d9e1df6b829a42ec88bba4c907c73f48b39e71511d7fb
                                                                                                                                                                                                                    • Instruction ID: 9760843419c98393fc84559ff1f348817b4acad2c0b4e93da511fd2dc798235b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1468099460f9f41eec5d9e1df6b829a42ec88bba4c907c73f48b39e71511d7fb
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 28F0B475604A04BFA700CFE6DE90D5FBBEDEF8D61075288A4F504D3204E634AE409AA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(KERNEL32.DLL,GetProductInfo,00000000,24090BD9), ref: 24090B9B
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,KERNEL32.DLL), ref: 24090BA1
                                                                                                                                                                                                                      • Part of subcall function 2408F870: GetVersionExW.KERNEL32(0000011C), ref: 2408F8DA
                                                                                                                                                                                                                      • Part of subcall function 2408F870: GetVersionExW.KERNEL32(00000094,0000011C), ref: 2408F8F6
                                                                                                                                                                                                                      • Part of subcall function 2408F870: GetSystemInfo.KERNEL32(?,0000011C), ref: 2408F95C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Version$AddressHandleInfoModuleProcSystem
                                                                                                                                                                                                                    • String ID: GetProductInfo$KERNEL32.DLL
                                                                                                                                                                                                                    • API String ID: 335284197-4189171773
                                                                                                                                                                                                                    • Opcode ID: 810db657c7b5435063e0327c5a93816742960031242e2b398112720f43246ab8
                                                                                                                                                                                                                    • Instruction ID: 7fa071a805053e33b165ffb8766eadb5eb35d23d774ebef24853473e00c0618b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 810db657c7b5435063e0327c5a93816742960031242e2b398112720f43246ab8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 84F0B4316146089FD701DFB5CEA0D8E7BE8EB99A287900131E801B3658EB35ADC19EA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(shell32.dll,ShellExecuteA,?,?,?,?,2408627C,?,00000000,00000000,00000000,240862A2), ref: 240866FA
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 24086700
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: ShellExecuteA$shell32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-4013357483
                                                                                                                                                                                                                    • Opcode ID: 86b1c3049ff82331729c4c084a0d7945fcd14d461b73ade3fc5268db42cfb27c
                                                                                                                                                                                                                    • Instruction ID: 1a4cba0d432d5d595430020046fc1caba1b64c7831f8f0aca64adff6e6520f34
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 86b1c3049ff82331729c4c084a0d7945fcd14d461b73ade3fc5268db42cfb27c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 12E08C722006183B6310DADBAD80EAFBBADDED9AA0710C52AB608C3208D4309D418AF0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(AVICAP32.dll,capGetDriverDescriptionA), ref: 2409191A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,AVICAP32.dll), ref: 24091920
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: AVICAP32.dll$capGetDriverDescriptionA
                                                                                                                                                                                                                    • API String ID: 2574300362-2465018903
                                                                                                                                                                                                                    • Opcode ID: cb443fcc5683e95ea429eaceaf3e42d439af1b622e1ab7c7de03c5c39d3e736a
                                                                                                                                                                                                                    • Instruction ID: 3b88c927d9c34af702779e40eb70b21a80e2ef941dced256d61f707e85348a22
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cb443fcc5683e95ea429eaceaf3e42d439af1b622e1ab7c7de03c5c39d3e736a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3FD0C2722005143B6310A5DBAC80C9BAB9DDFE5970300802AB51897109C4308D4196F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetSystemDirectoryA,?,?,24086F52,00000000,24086F93), ref: 24086E58
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 24086E5E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: GetSystemDirectoryA$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-261809815
                                                                                                                                                                                                                    • Opcode ID: afa03a52fadc62cf126cb9df784c5854a436c2c9c81659f156c431aa878d51b9
                                                                                                                                                                                                                    • Instruction ID: e552cdb3c2cc82cbe47c322d06972bc29e5ab341057be491b9f6930263d7f3fc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: afa03a52fadc62cf126cb9df784c5854a436c2c9c81659f156c431aa878d51b9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DFC09B91641A303B772075F6DED4E9F458DCE754673010861B515E3109D5554D8459F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetWindowsDirectoryA,?,?,24086FDE,00000000,2408701F), ref: 24086EA0
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 24086EA6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: GetWindowsDirectoryA$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-157430550
                                                                                                                                                                                                                    • Opcode ID: 2576f27f95b7c545232153c667ae4b6229afffc2e3f1e2ab892ea3aabb5f9dd2
                                                                                                                                                                                                                    • Instruction ID: ad165a90d513ec477b49c9aafd696f273aa21fdbe02caf4e2b9115b81c4623b6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2576f27f95b7c545232153c667ae4b6229afffc2e3f1e2ab892ea3aabb5f9dd2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6DC09B91551E303B772076F65ED4E9F458DCE6547B30108517514F210D95554D8419F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(ntdll.dll,ZwUnmapViewOfSection,?,00000000,240C4A7E,?,?,?,00000004,?,?,00010002), ref: 240C494C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,ntdll.dll), ref: 240C4952
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: ZwUnmapViewOfSection$ntdll.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-452462277
                                                                                                                                                                                                                    • Opcode ID: 201dc8eb16b1d9c59ecfba3f3a059b84e2c2a9ff51e8dbb261888cb1d0dd0537
                                                                                                                                                                                                                    • Instruction ID: d5100be8c530f997de61b22929038440bffd21d35d21b6d055389dc42ac3bc03
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 201dc8eb16b1d9c59ecfba3f3a059b84e2c2a9ff51e8dbb261888cb1d0dd0537
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A9C02BD1241A303B3320E1FA6CC0FDF008CDDE406730100113004F200884000D8019F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(shell32.dll,SHFileOperationA), ref: 24085E8D
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 24085E93
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: SHFileOperationA$shell32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-1445012119
                                                                                                                                                                                                                    • Opcode ID: f0ff078fdfa81ad6f6ff64c5cacd1a556ded1528ab5b80b700470dc4f5088d75
                                                                                                                                                                                                                    • Instruction ID: 29513d0ef0f736883b0b00c805380371e577bcf8ff92e333702f646d51ce0821
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f0ff078fdfa81ad6f6ff64c5cacd1a556ded1528ab5b80b700470dc4f5088d75
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0FB012F0141B303F771526F29FD0F1F008F5E7401738004003000F100DC9245AC42C71
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(000001F4,00000000,240B2867,?,?,?,?,00000000,00000000), ref: 240B2777
                                                                                                                                                                                                                    • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000013,240B288C,240B288C,240B288C,240B2880,?,000001F4,00000000,240B2867), ref: 240B2814
                                                                                                                                                                                                                    • GetForegroundWindow.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000013,240B288C,240B288C,240B288C,240B2880,?,000001F4,00000000,240B2867), ref: 240B2819
                                                                                                                                                                                                                    • SetForegroundWindow.USER32(?), ref: 240B2828
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Foreground$Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1564942233-0
                                                                                                                                                                                                                    • Opcode ID: f2f447f7d27fb4a063de258b76bf4d8a7fcf39029a08d1de756ec2811d51672e
                                                                                                                                                                                                                    • Instruction ID: 068297def6d2b3760846d78dcb816023847c8fd71ec8d6c5028b7cb91c444080
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f2f447f7d27fb4a063de258b76bf4d8a7fcf39029a08d1de756ec2811d51672e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8521FE35601210EFFB01CF95C994F59BBE5EB59304F604274FA80AF298CBB4A9C4CB89
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000001,?,00000000,240AD228), ref: 240AD194
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,?,00000000,240AD228), ref: 240AD1B8
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001), ref: 240AD1E2
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000), ref: 240AD1FC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: QueryValue$CloseOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1586453840-0
                                                                                                                                                                                                                    • Opcode ID: 5db29a71017a4797132414fba1ffc631d4e064b0cc49f7577cd84863d828ecfc
                                                                                                                                                                                                                    • Instruction ID: f15a97948fa6c889147bec58d2629a165401338040125b47f1601ca2b6eb3449
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5db29a71017a4797132414fba1ffc631d4e064b0cc49f7577cd84863d828ecfc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 882129B5A00148AFEB00DBE9DE81EEFF7FDEF99644F500465B504E7244EA719E408B61
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountTick
                                                                                                                                                                                                                    • String ID: t2$$2$$2$
                                                                                                                                                                                                                    • API String ID: 536389180-1677347215
                                                                                                                                                                                                                    • Opcode ID: ad62d1b2d851e3dd929fdc3c8920d76bf388a7da23e08ca1306fea3edc36f5d0
                                                                                                                                                                                                                    • Instruction ID: 024d26aec119e63264e4d1abb18bf2fdcc44bb21fd6a0d755a9c996f7be0df3a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad62d1b2d851e3dd929fdc3c8920d76bf388a7da23e08ca1306fea3edc36f5d0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AB218730B04108EFEB01DB94D991B9EB3E5EBD4708F708275A440A7348CAF1EEC58659
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 240943BC
                                                                                                                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 240943E5
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 240943EF
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000,00000000,?), ref: 240943F5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Free$Heap$LibraryProcessVirtual
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 548792435-0
                                                                                                                                                                                                                    • Opcode ID: e397ac280746f29899e15f16e5528460aafa8f579bd66a3a500ee80fa3434e0e
                                                                                                                                                                                                                    • Instruction ID: 0d3d2874e07445a8b23b884448ac5a09d48207ac3d6f7ff082850ce5a37500e9
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e397ac280746f29899e15f16e5528460aafa8f579bd66a3a500ee80fa3434e0e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17118471A042149FEB10CF68C8C0B0ABBE8EF54724F248195ED18EB285D770ED90DBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClassInfoA.USER32(24080000,240B15A0,?), ref: 240B16A5
                                                                                                                                                                                                                    • UnregisterClassA.USER32(240B15A0,24080000), ref: 240B16CE
                                                                                                                                                                                                                    • RegisterClassA.USER32(240CAA5C), ref: 240B16D8
                                                                                                                                                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 240B1723
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4025006896-0
                                                                                                                                                                                                                    • Opcode ID: 6143290883a634a922ed70b13b6e8e050332cf149ce851a3f0c23cc92d443a86
                                                                                                                                                                                                                    • Instruction ID: be163cbbbb7cffabc85509210853656e0eea88640b02ca9806cbfac86abd37a6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6143290883a634a922ed70b13b6e8e050332cf149ce851a3f0c23cc92d443a86
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3001A171604204EBDB00DE69DD80F5E33A9E71820CF208230F954FB284DA39DDC08B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClassInfoA.USER32(24080000,240C3AB0,?), ref: 240C3BA1
                                                                                                                                                                                                                    • UnregisterClassA.USER32(240C3AB0,24080000), ref: 240C3BCA
                                                                                                                                                                                                                    • RegisterClassA.USER32(240CAAC4), ref: 240C3BD4
                                                                                                                                                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 240C3C1F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4025006896-0
                                                                                                                                                                                                                    • Opcode ID: d77af03b3061eb8ca3272bc9f01eaab0c0105a6aad18e759fccd2fed7d0c25f8
                                                                                                                                                                                                                    • Instruction ID: 62b1ce26e90a5d3815a5fd726919166950108f0270f6cd0e94adc0ddf0f65947
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d77af03b3061eb8ca3272bc9f01eaab0c0105a6aad18e759fccd2fed7d0c25f8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 24014071A14204EBEB40DEA8CD80F9E77A9E71D21DF508221FA14F7284DA7ED8D58B64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,24086E3A), ref: 24086DE6
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,24086E3A), ref: 24086DFE
                                                                                                                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,24086E3A), ref: 24086E14
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,24086E3A), ref: 24086E1A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseCreateHandlePointerWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3604237281-0
                                                                                                                                                                                                                    • Opcode ID: 2fcf1791df4547d8dda3cf7f4c5e1219e36f7f43c5f21bbb9450f0429401da83
                                                                                                                                                                                                                    • Instruction ID: de56b5ad2ee08ff546e319ee7d768b1a435e0afc0e280d7e4a876c1baca26b98
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2fcf1791df4547d8dda3cf7f4c5e1219e36f7f43c5f21bbb9450f0429401da83
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EF11F9706007047EF710D7B4DE92F9EB6ECDB55B28F610571F510F61C5DAB16E808554
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000003,00000000,00000000,00000000,240C2231), ref: 240C21E2
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000,00000000,240C2231), ref: 240C21F5
                                                                                                                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000), ref: 240C220B
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000), ref: 240C2211
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseCreateHandlePointerWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3604237281-0
                                                                                                                                                                                                                    • Opcode ID: 3333dc8f723303d6199c4a1d78ca5ec83855d69510a2a9050b20ce6c2ae90ee0
                                                                                                                                                                                                                    • Instruction ID: dd8baee9be185fc324ac02581c870e9e4eee3ae01d5990484cf7897c3f1c8590
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3333dc8f723303d6199c4a1d78ca5ec83855d69510a2a9050b20ce6c2ae90ee0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 220128B0A00304BFF710D774DD92F5EB6ECDB98B18F600570B500F65D5DAB1AE808514
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(?,?), ref: 24085E08
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?), ref: 24085E11
                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?), ref: 24085E25
                                                                                                                                                                                                                    • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 24085E34
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileTime$DateErrorFindLastLocalNext
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2103556486-0
                                                                                                                                                                                                                    • Opcode ID: 35ee4c87c0733f378fda42a6ee83e5f4e77b0bc598ce5457ab0990d3e22c7572
                                                                                                                                                                                                                    • Instruction ID: a8a69a9edf18aa12e55a597b116aea47e37760be6fe743169c72cf6f8c60e256
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 35ee4c87c0733f378fda42a6ee83e5f4e77b0bc598ce5457ab0990d3e22c7572
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A1F037B62042009FDB08CFA4CAC1C8B33ECAF5822470489A6AD14CF24FF634E594CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 240A826F
                                                                                                                                                                                                                    • TranslateMessage.USER32 ref: 240A8281
                                                                                                                                                                                                                    • DispatchMessageA.USER32 ref: 240A8287
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000014,?,00000000,00000000,00000000,00000001,?,00000000,240A82A2), ref: 240A828E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message$DispatchPeekSleepTranslate
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3768732053-0
                                                                                                                                                                                                                    • Opcode ID: e0efee013de51039d0e7354980530cf19b861c011bd827873c97cf82d2cc744c
                                                                                                                                                                                                                    • Instruction ID: f37470e6b45f03e9db647a18076d76271d8d7041e2e642230dc4a2d10df04929
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e0efee013de51039d0e7354980530cf19b861c011bd827873c97cf82d2cc744c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 08E01732382B3039FB6166E41E82FEE668A4F62A8EF544135F301AA1C4CA91598043ED
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 24085AD7
                                                                                                                                                                                                                    • TranslateMessage.USER32 ref: 24085AE9
                                                                                                                                                                                                                    • DispatchMessageA.USER32 ref: 24085AEF
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000001,?,00000000,24085B0A), ref: 24085AF6
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message$DispatchPeekSleepTranslate
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3768732053-0
                                                                                                                                                                                                                    • Opcode ID: dfb7a78da4aa2ebe70cdd1689e7c55d7b7e07aafa8ff7ae68d9c62b42834ab5f
                                                                                                                                                                                                                    • Instruction ID: 5d5d1bc8b862d8d9543ec7678fb855b39dc6b6a22f48251e14d167e2ba94bc67
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dfb7a78da4aa2ebe70cdd1689e7c55d7b7e07aafa8ff7ae68d9c62b42834ab5f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7DE0173138372039FB2196A41EC2FDE628A4F22A8EF504135B201BA1C4CAC5598082A9
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GlobalHandle.KERNEL32 ref: 2408548F
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 24085496
                                                                                                                                                                                                                    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 2408549B
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 240854A1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Global$AllocHandleLockUnlock
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2167344118-0
                                                                                                                                                                                                                    • Opcode ID: 505157e451beb4b904f6f62bc6a33cc31f1955a287db27c020f03c767c2bc075
                                                                                                                                                                                                                    • Instruction ID: f3d77df0c2e496a6fcd5ea418385657e489c23666ad14941b0d8c481d81ca8a2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 505157e451beb4b904f6f62bc6a33cc31f1955a287db27c020f03c767c2bc075
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 94B002C49907043DBB142BF44E19D3F009E9FB450979449543400D2008E8699C9868B1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountTick
                                                                                                                                                                                                                    • String ID: *.*$.tmp
                                                                                                                                                                                                                    • API String ID: 536389180-2468557045
                                                                                                                                                                                                                    • Opcode ID: de9adf5a8c67aa8b87284ae6492263ecaffd55852226da47c42eb16656d9e841
                                                                                                                                                                                                                    • Instruction ID: e4f2d9a049262886a8ee89fd89852fcc2e5efd0003ad477d028c6d0f29151e28
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: de9adf5a8c67aa8b87284ae6492263ecaffd55852226da47c42eb16656d9e841
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 15718F30A042189FEB21CF61DD90ADEBBB9EB99304FA080F5D848A2754DB719EC5CE54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindow.USER32 ref: 240B024A
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,FFFFFFFF), ref: 240B0263
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ProcessThread
                                                                                                                                                                                                                    • String ID: #|#
                                                                                                                                                                                                                    • API String ID: 3635926707-3836175907
                                                                                                                                                                                                                    • Opcode ID: 7c2e28b80d42533c65be406909771878f1cf0b2c9102a72ef09598382d0faeed
                                                                                                                                                                                                                    • Instruction ID: 3da95508d8a54926560a791c1728fcf8c4816282569002b0feb2b91beb0a5adf
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c2e28b80d42533c65be406909771878f1cf0b2c9102a72ef09598382d0faeed
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D9318470600208AFFB05DBA4CA94DAEB3BDEFD8704F508575E80093744EA719E818A64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualFree.KERNEL32(?,?,00004000), ref: 24093D26
                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,?,00000000,?), ref: 24093D80
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • FinalizeSections: VirtualProtect failed, xrefs: 24093D8E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$FreeProtect
                                                                                                                                                                                                                    • String ID: FinalizeSections: VirtualProtect failed
                                                                                                                                                                                                                    • API String ID: 2581862158-3584865983
                                                                                                                                                                                                                    • Opcode ID: 6d98d515a9b3b5d66b6c25b9fdd88f33975f4f966a11bfc609c54d7f3f669307
                                                                                                                                                                                                                    • Instruction ID: c53bbe0c7f358239feba0cda537ce555d7aa01f8bf0656b723b3048b7c8c9c13
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6d98d515a9b3b5d66b6c25b9fdd88f33975f4f966a11bfc609c54d7f3f669307
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D2213B76702200AFE700CF59E9D4F4A7BE8AF5DA94B094151FE48CB355D2B0ED809B51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 240A7A4F
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,.bmp,?,?,00000000,240A7AB6), ref: 240A7A7C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountDeleteFileTick
                                                                                                                                                                                                                    • String ID: .bmp
                                                                                                                                                                                                                    • API String ID: 3334397753-2863430793
                                                                                                                                                                                                                    • Opcode ID: 67f4afa7c1725baa1bfbe1eb6f18927d8f99b99a6ff45f6c0c3d1af988224397
                                                                                                                                                                                                                    • Instruction ID: f374b8a90a25705b82f7fc8759f17840ad165932724709fd068315481b825467
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 67f4afa7c1725baa1bfbe1eb6f18927d8f99b99a6ff45f6c0c3d1af988224397
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 21119330900118AFEB00DFE4DD90A9EB7B9EFA8304F508479E414A7358DB71AF819E50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ioctlsocket.WS2_32(?,4004667F), ref: 24092C0D
                                                                                                                                                                                                                      • Part of subcall function 24092A38: shutdown.WS2_32(?,00000002), ref: 24092A83
                                                                                                                                                                                                                      • Part of subcall function 24092A38: closesocket.WS2_32(?), ref: 24092AB1
                                                                                                                                                                                                                    • WSAGetLastError.WS2_32(?,00000000,?,00000000,?,?,00000000,?,24092CBD,?,?,240A964C,00000000,240AA33B), ref: 24092C52
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000008.00000002.2518814760.0000000024080000.00000040.00000400.00020000.00000000.sdmp, Offset: 24080000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240D4000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000008.00000002.2518814760.00000000240DB000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_8_2_24080000_explorer.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLastclosesocketioctlsocketshutdown
                                                                                                                                                                                                                    • String ID: 3'
                                                                                                                                                                                                                    • API String ID: 3350378930-280543908
                                                                                                                                                                                                                    • Opcode ID: 05f746042fd6d8ccc1c87317fa8887e6a4e8be7e0c9f5f1f579b0408e8897943
                                                                                                                                                                                                                    • Instruction ID: 0447beb9d20b2e9efb65ad6154d49a664647d369ca6b37fded5f85e8ce1fa81a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 05f746042fd6d8ccc1c87317fa8887e6a4e8be7e0c9f5f1f579b0408e8897943
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 920184F52192009BD3107E399C84A4F66D8AB5DB74F114E3CB1E4DF295D634C8C1A792

                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                    Execution Coverage:7%
                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:11.2%
                                                                                                                                                                                                                    Signature Coverage:0%
                                                                                                                                                                                                                    Total number of Nodes:2000
                                                                                                                                                                                                                    Total number of Limit Nodes:16
                                                                                                                                                                                                                    execution_graph 16168 240f8dce 16169 240f8dde 16168->16169 16170 240f8dd9 16168->16170 16172 240f8cf8 GetThreadLocale 16170->16172 16183 240f8cd0 GetLocaleInfoA 16172->16183 16175 240f8cd0 GetLocaleInfoA 16176 240f8d36 16175->16176 16185 240f3088 16176->16185 16179 240f3088 6 API calls 16180 240f8d4b 16179->16180 16189 240f30ac 16180->16189 16184 240f8cec 16183->16184 16184->16175 16186 240f308e 16185->16186 16187 240f30a8 16185->16187 16186->16187 16193 240f135c 16186->16193 16187->16179 16191 240f30b2 16189->16191 16190 240f30d7 16190->16169 16191->16190 16192 240f135c 6 API calls 16191->16192 16192->16191 16194 240f136a 16193->16194 16196 240f1360 16193->16196 16194->16187 16195 240f13f5 16208 240f13c4 16195->16208 16196->16194 16196->16195 16200 240f4d70 16196->16200 16201 240f4d7f 16200->16201 16202 240f4da5 TlsGetValue 16200->16202 16201->16195 16203 240f4daf 16202->16203 16204 240f4d8a 16202->16204 16203->16195 16211 240f4cb4 16204->16211 16206 240f4d8f TlsGetValue 16207 240f4d9e 16206->16207 16207->16195 16218 240f2ff4 16208->16218 16213 240f4cba 16211->16213 16212 240f4cde 16212->16206 16213->16212 16217 240f4ca0 LocalAlloc 16213->16217 16215 240f4cda 16215->16212 16216 240f4cea TlsSetValue 16215->16216 16216->16212 16217->16215 16221 240f2f24 16218->16221 16222 240f2f3d 16221->16222 16223 240f2f9f FreeLibrary 16222->16223 16224 240f2fc4 ExitProcess 16222->16224 16223->16222 16226 240f132d RtlReAllocateHeap 16227 24120db8 16234 240f7038 16227->16234 16229 24120df7 16230 24120e02 SHGetFileInfo 16229->16230 16231 24120e26 16230->16231 16232 240f3088 6 API calls 16231->16232 16233 24120e3e 16232->16233 16237 240f6edc LoadLibraryA GetProcAddress 16234->16237 16236 240f704d 16236->16229 16238 240f6efb 16237->16238 16238->16236 16239 5b0000 16240 5b001b RtlExitUserThread 16239->16240 16242 3cc0000 16252 24118260 PeekMessageA 16242->16252 16256 240f12f2 16242->16256 16258 240f78c4 CreateThread SetThreadPriority 16242->16258 16259 240f12f4 RtlAllocateHeap 16242->16259 16260 24136188 16242->16260 16391 240f1308 HeapFree 16242->16391 16392 240f78c8 CreateThread SetThreadPriority 16242->16392 16393 240f5c1c OpenProcess 16242->16393 16243 3cc001f 16253 24118278 16252->16253 16254 2411828c Sleep 16252->16254 16253->16254 16255 24118280 TranslateMessage DispatchMessageA 16253->16255 16254->16243 16255->16254 16257 240f12f4 RtlAllocateHeap 16256->16257 16257->16243 16258->16243 16397 24132464 16258->16397 16409 241182ac 16258->16409 16447 241184fc 16258->16447 16520 2413251c 16258->16520 16527 241300ac 16258->16527 16259->16243 16261 24136190 16260->16261 16261->16261 18384 240f4dbc 16261->18384 16264 240f7038 2 API calls 16265 241361bf 16264->16265 16266 240f3388 6 API calls 16265->16266 16267 241361d1 16266->16267 16268 240f6ce4 12 API calls 16267->16268 16269 241361e3 16268->16269 16270 240f30dc 6 API calls 16269->16270 16271 241361f0 16270->16271 16272 240f3590 6 API calls 16271->16272 16273 24136218 16272->16273 16274 240f35d0 6 API calls 16273->16274 16275 24136239 16274->16275 16276 240f3590 6 API calls 16275->16276 16277 2413625c 16276->16277 16278 240f35d0 6 API calls 16277->16278 16279 2413627d 16278->16279 18388 240f7be0 16279->18388 16284 24136296 RegOpenKeyExA 16286 240f3534 16284->16286 16285 241362d4 16287 24136332 16285->16287 16289 240f3388 6 API calls 16285->16289 16288 241362bd RegDeleteKeyA RegCloseKey 16286->16288 16290 2413633c DeleteFileA 16287->16290 16288->16285 16291 241362f3 16289->16291 16292 2413634e 16290->16292 18514 240f4f18 CreateMutexA 16291->18514 18515 240f4f18 CreateMutexA 16292->18515 16295 24136358 GetLastError 16297 24136373 CreateThread CreateThread 16295->16297 16298 2413636c ExitProcess 16295->16298 16296 24136305 GetLastError 16299 24136319 CloseHandle 16296->16299 16300 24136328 16296->16300 16302 241363ab 16297->16302 16303 241363da 16297->16303 18886 24134c04 16297->18886 18896 241351bc 16297->18896 16299->16287 18592 24135240 16300->18592 16306 240f15e0 17 API calls 16302->16306 16305 24136413 GetCurrentProcessId 16303->16305 16309 240f15e0 17 API calls 16303->16309 16308 240f5c1c 4 API calls 16305->16308 16314 241363b5 16306->16314 16307 2413672b 16310 240f30ac 6 API calls 16307->16310 16311 2413641d 16308->16311 16318 241363ee 16309->16318 16312 24136745 16310->16312 18543 240f5b30 GetVersionExA 16311->18543 16312->16243 16314->16303 18516 240f757c 16314->18516 16318->16305 18537 240f7728 16318->18537 16322 240f6588 6 API calls 16326 241363d2 16322->16326 16323 240f33fc 6 API calls 16327 24136446 16323->16327 16325 240f6588 6 API calls 16328 2413640b 16325->16328 18529 240f7668 16326->18529 16330 241365a3 16327->16330 16333 2410444c 6 API calls 16327->16333 16331 240f7728 8 API calls 16328->16331 18554 24124448 16330->18554 16331->16305 16335 24136466 16333->16335 16337 240f30dc 6 API calls 16335->16337 16336 240f30dc 6 API calls 16339 241365cb 16336->16339 16338 24136473 16337->16338 16340 240f3344 6 API calls 16338->16340 16341 241365e3 16339->16341 18628 240f78c8 CreateThread SetThreadPriority 16339->18628 16342 24136482 16340->16342 16344 241365fb 16341->16344 18629 240f78c8 CreateThread SetThreadPriority 16341->18629 16346 240f6c78 8 API calls 16342->16346 16345 240f67f8 10 API calls 16344->16345 16348 24136617 16345->16348 16354 2413648e 16346->16354 16349 240f33fc 6 API calls 16348->16349 16351 24136633 16349->16351 16350 241364b0 16352 240f6ce4 12 API calls 16350->16352 16353 2413668f 16351->16353 18630 24133a04 16351->18630 16355 241364c4 16352->16355 18588 240f78c8 CreateThread SetThreadPriority 16353->18588 16354->16350 16358 240f6da0 10 API calls 16354->16358 16359 240f30dc 6 API calls 16355->16359 16358->16350 16390 241364d1 16359->16390 16360 2413669d 18589 240f78c8 CreateThread SetThreadPriority 16360->18589 16363 24136653 18634 240f6858 16363->18634 16364 241366ab 18590 240f4f18 CreateMutexA 16364->18590 16365 2413655e 16370 2413656f SetFileAttributesA 16365->16370 16368 241366b9 16373 240f6c78 8 API calls 16368->16373 16371 240f7668 11 API calls 16370->16371 16375 24136581 16371->16375 16372 240f3590 6 API calls 16372->16390 16384 241366c2 16373->16384 16381 2413658f SetFileAttributesA 16375->16381 16376 24136679 18647 240f78c8 CreateThread SetThreadPriority 16376->18647 16377 2410444c 6 API calls 16377->16390 16378 241366f8 16380 24136707 CloseHandle CloseHandle Sleep 16378->16380 16385 24118298 4 API calls 16378->16385 16380->16307 18553 240f78c8 CreateThread SetThreadPriority 16381->18553 16383 240f3344 6 API calls 16383->16390 16384->16378 18591 240f66e4 LoadLibraryA GetProcAddress ShellExecuteA 16384->18591 16385->16378 16387 241366e1 16387->16378 16388 241366e6 Sleep CloseHandle 16387->16388 16388->16378 16389 240f35d0 6 API calls 16389->16390 16390->16365 16390->16372 16390->16377 16390->16383 16390->16389 16391->16243 16392->16243 18941 24132464 42 API calls 16392->18941 18942 241182ac 158 API calls 16392->18942 18943 241184fc 158 API calls 16392->18943 18944 2413251c 158 API calls 16392->18944 18945 241300ac 51 API calls 16392->18945 16394 240f5c34 NtQueryInformationProcess 16393->16394 16395 240f5c71 16393->16395 16394->16395 16396 240f5c4c NtSetInformationProcess CloseHandle 16394->16396 16395->16243 16396->16395 16398 24132484 Sleep 16397->16398 16573 240f794c 16398->16573 16400 24132493 16584 240f30dc 16400->16584 16590 2413038c 16400->16590 16404 241324b8 16404->16398 16405 241324de 16404->16405 16631 24132240 16404->16631 16407 240f30dc 6 API calls 16405->16407 16408 241324ee GetTickCount 16407->16408 16408->16398 16410 241182b4 16409->16410 16411 241182ee 16410->16411 16412 240f3344 6 API calls 16410->16412 16413 240f3088 6 API calls 16411->16413 16412->16410 16414 241182f8 16413->16414 16415 240f7038 2 API calls 16414->16415 16416 24118300 16415->16416 16417 240f3388 6 API calls 16416->16417 16418 24118310 16417->16418 16419 240f6910 7 API calls 16418->16419 16420 24118318 16419->16420 16421 240f69b8 7 API calls 16420->16421 16422 24118328 16421->16422 16821 240f6a60 GetLocalTime 16422->16821 16425 240f33fc 6 API calls 16426 24118348 16425->16426 16427 240f6c78 8 API calls 16426->16427 16430 24118350 16427->16430 16428 24118369 16827 240f78c8 CreateThread SetThreadPriority 16428->16827 16430->16428 16432 240f6da0 10 API calls 16430->16432 16431 24118377 Sleep 16443 24118384 16431->16443 16432->16428 16434 240f6910 7 API calls 16434->16443 16435 240f69b8 7 API calls 16435->16443 16436 240f6a60 7 API calls 16436->16443 16437 240f33fc 6 API calls 16437->16443 16439 240f6c78 8 API calls 16439->16443 16440 241183f3 GetTickCount 16440->16443 16441 240f6da0 10 API calls 16441->16443 16443->16434 16443->16435 16443->16436 16443->16437 16443->16439 16443->16440 16443->16441 16828 24118298 16443->16828 16832 240f6634 16443->16832 16840 24102638 16443->16840 16875 240f78ec TerminateThread CloseHandle 16443->16875 16876 240f78c8 CreateThread SetThreadPriority 16443->16876 16446 24118460 Sleep 16446->16443 16448 24118504 16447->16448 16448->16448 16449 240f7038 2 API calls 16448->16449 16450 24118525 16449->16450 16451 240f3388 6 API calls 16450->16451 16452 24118535 16451->16452 16453 240f6910 7 API calls 16452->16453 16454 2411853d 16453->16454 16455 240f69b8 7 API calls 16454->16455 16456 2411854d 16455->16456 16457 240f6a60 7 API calls 16456->16457 16458 2411855d 16457->16458 16459 240f33fc 6 API calls 16458->16459 16460 2411856d 16459->16460 16461 240f6c78 8 API calls 16460->16461 16462 24118575 16461->16462 16463 240f6da0 10 API calls 16462->16463 16487 2411858e 16462->16487 16463->16487 16464 240f6c78 8 API calls 16464->16487 16465 240f6634 11 API calls 16465->16487 16466 240f7038 2 API calls 16468 241185d0 GetTickCount 16466->16468 16467 240f6910 7 API calls 16467->16487 16501 241185c8 16468->16501 16469 240f69b8 7 API calls 16469->16487 16470 240f6a60 7 API calls 16470->16487 16471 240f33fc 6 API calls 16471->16487 16473 2411870e Sleep 16473->16487 16474 240f3120 6 API calls 16474->16487 16475 240f6da0 10 API calls 16475->16473 16476 240f3088 6 API calls 16476->16487 16477 24118641 CopyFileA 16477->16501 16479 240f3590 6 API calls 16479->16487 16480 241187b6 Sleep 16480->16487 16481 24118950 Sleep GetTickCount 16918 24102908 16481->16918 16482 24118cfe CloseHandle 16485 240f3388 6 API calls 16482->16485 16483 240f35d0 6 API calls 16483->16487 16488 24118d20 16485->16488 16486 240f58f0 6 API calls 16486->16487 16487->16464 16487->16465 16487->16467 16487->16469 16487->16470 16487->16471 16487->16473 16487->16474 16487->16475 16487->16476 16487->16479 16487->16480 16487->16481 16487->16482 16487->16483 16487->16486 16487->16501 17124 240f4f18 CreateMutexA 16488->17124 16490 241189d2 Sleep 16490->16501 16491 24118d32 GetLastError 16492 24118d40 CloseHandle 16491->16492 16493 24118d59 CloseHandle 16491->16493 16495 24118db2 16492->16495 16493->16501 16494 240f33fc 6 API calls 16494->16501 16500 240f30ac 6 API calls 16495->16500 16499 24118d97 CloseHandle 16499->16495 16503 24118dcc 16500->16503 16501->16466 16501->16477 16501->16482 16501->16487 16501->16490 16501->16494 16501->16499 16508 24102638 24 API calls 16501->16508 16509 240f6da0 10 API calls 16501->16509 16510 240f6634 11 API calls 16501->16510 16511 240f3120 6 API calls 16501->16511 16513 240f3088 6 API calls 16501->16513 16514 240f78c8 145 API calls 16501->16514 16516 240f30dc 6 API calls 16501->16516 16517 240f3590 6 API calls 16501->16517 16518 240f35d0 6 API calls 16501->16518 16931 240f61a0 16501->16931 16935 240f6438 16501->16935 16947 24104720 16501->16947 16957 2410e9ec 16501->16957 17007 24118f28 16501->17007 17027 24102b84 16501->17027 17033 241195f4 16501->17033 17120 24102d34 16501->17120 17125 24117cd4 16501->17125 16505 240f3088 6 API calls 16503->16505 16504 24117cd4 6 API calls 16504->16501 16507 24118dd4 16505->16507 16508->16501 16509->16501 16510->16501 16511->16501 16513->16501 16514->16501 16516->16501 16517->16501 16518->16501 16521 240f3088 6 API calls 16520->16521 16522 24132526 16521->16522 18225 240f78c8 CreateThread SetThreadPriority 16522->18225 16524 24132534 Sleep 16525 241300ac 51 API calls 16524->16525 16526 2413254a 16525->16526 16526->16524 16528 241300b4 16527->16528 16528->16528 16529 241302af 16528->16529 16530 240f6438 15 API calls 16528->16530 16531 240f30ac 6 API calls 16529->16531 16535 241300e2 16530->16535 16532 241302c9 16531->16532 16533 240f30ac 6 API calls 16532->16533 16534 241302d6 16533->16534 16535->16529 16536 24130114 16535->16536 18231 240f6588 16536->18231 16539 24130135 16540 240f33fc 6 API calls 16539->16540 16541 2413014a 16540->16541 16542 24130161 CopyFileA SetFileAttributesA 16541->16542 18252 240f6ce4 16542->18252 16545 240f6634 11 API calls 16546 24130188 16545->16546 16546->16529 18268 240f7064 16546->18268 16551 240f33fc 6 API calls 16552 241301c1 16551->16552 16553 240f6bd0 7 API calls 16552->16553 16554 241301d1 16553->16554 16555 240f6b28 7 API calls 16554->16555 16556 241301e1 16555->16556 16557 240f6b08 GetLocalTime 16556->16557 16558 241301f1 16557->16558 16559 240f6910 7 API calls 16558->16559 16560 24130201 16559->16560 16561 240f69b8 7 API calls 16560->16561 16562 24130211 16561->16562 16563 240f6a60 7 API calls 16562->16563 16564 24130221 16563->16564 16565 240f33fc 6 API calls 16564->16565 16566 24130231 16565->16566 18284 24102134 16566->18284 16572 24130269 16572->16529 16574 240f3088 6 API calls 16573->16574 16575 240f796b GetForegroundWindow 16574->16575 16576 240f7976 GetWindowTextLengthA 16575->16576 16578 240f79a3 16575->16578 16664 240f36bc 16576->16664 16580 240f3088 6 API calls 16578->16580 16579 240f7989 16582 240f7992 GetWindowTextA 16579->16582 16581 240f79b8 16580->16581 16581->16400 16673 240f790c 16582->16673 16585 240f30e0 16584->16585 16588 240f30f0 16584->16588 16587 240f3148 6 API calls 16585->16587 16585->16588 16586 240f311c 16586->16400 16587->16588 16588->16586 16589 240f135c 6 API calls 16588->16589 16589->16586 16597 24130394 16590->16597 16591 241303c4 GetAsyncKeyState 16591->16597 16592 24131c4b 16596 240f3590 6 API calls 16592->16596 16593 241303ea GetKeyState 16594 241303f7 GetKeyState 16593->16594 16595 2413046b GetKeyState 16593->16595 16594->16597 16595->16597 16598 24131c68 16596->16598 16597->16591 16597->16592 16597->16593 16599 241304f1 GetKeyState 16597->16599 16602 24131b5d GetKeyState 16597->16602 16611 240f3344 6 API calls 16597->16611 16614 241305f8 16597->16614 16603 24131c94 16598->16603 16604 24131c7a 16598->16604 16600 24130572 GetKeyState 16599->16600 16601 241304fe GetKeyState 16599->16601 16600->16597 16601->16597 16605 24131bd7 GetKeyState 16602->16605 16606 24131b6a GetKeyState 16602->16606 16609 240f3590 6 API calls 16603->16609 16725 240f35d0 16604->16725 16605->16614 16606->16614 16607 24130318 9 API calls 16607->16614 16613 24131cb1 16609->16613 16610 240f5948 7 API calls 16610->16614 16611->16597 16612 240f59cc 7 API calls 16612->16614 16618 24131cc3 16613->16618 16619 24131cdd 16613->16619 16614->16597 16614->16602 16614->16607 16614->16610 16614->16612 16616 240f3344 6 API calls 16614->16616 16711 240f3344 16614->16711 16616->16614 16617 24131c8f 16620 240f30ac 6 API calls 16617->16620 16622 240f35d0 6 API calls 16618->16622 16623 240f3590 6 API calls 16619->16623 16621 24131d9a GetTickCount 16620->16621 16621->16404 16622->16617 16624 24131cfa 16623->16624 16625 24131d23 16624->16625 16626 24131d0c 16624->16626 16628 240f3590 6 API calls 16625->16628 16627 240f35d0 6 API calls 16626->16627 16627->16617 16629 24131d40 16628->16629 16629->16617 16630 240f35d0 6 API calls 16629->16630 16630->16617 16736 240f6c78 16631->16736 16634 2413229f 16743 240f6bd0 GetLocalTime 16634->16743 16640 240f3344 6 API calls 16643 24132288 16640->16643 16786 240f6da0 16643->16786 16644 241322d7 16757 240f6910 GetLocalTime 16644->16757 16665 240f36c9 16664->16665 16672 240f36f9 16664->16672 16667 240f36f2 16665->16667 16669 240f36d5 16665->16669 16666 240f3088 6 API calls 16668 240f36e3 16666->16668 16687 240f3148 16667->16687 16668->16579 16680 240f1374 16669->16680 16672->16666 16674 240f791a 16673->16674 16675 240f792b 16674->16675 16676 240f7920 16674->16676 16699 240f3590 16675->16699 16677 240f30dc 6 API calls 16676->16677 16678 240f7929 16677->16678 16678->16578 16681 240f137a 16680->16681 16681->16668 16682 240f138c 16681->16682 16683 240f4d70 4 API calls 16681->16683 16684 240f13f5 16681->16684 16682->16668 16683->16684 16685 240f13c4 2 API calls 16684->16685 16686 240f1417 16685->16686 16686->16668 16688 240f314c 16687->16688 16689 240f3170 16687->16689 16692 240f1344 16688->16692 16689->16672 16691 240f3159 16691->16672 16693 240f1352 16692->16693 16694 240f1348 16692->16694 16693->16691 16694->16693 16695 240f4d70 4 API calls 16694->16695 16696 240f13f5 16694->16696 16695->16696 16697 240f13c4 2 API calls 16696->16697 16698 240f1417 16697->16698 16698->16691 16700 240f35c2 16699->16700 16702 240f3595 16699->16702 16701 240f3088 6 API calls 16700->16701 16703 240f35b8 16701->16703 16702->16700 16704 240f35a9 16702->16704 16703->16678 16706 240f3174 16704->16706 16707 240f3148 6 API calls 16706->16707 16708 240f3184 16707->16708 16709 240f3088 6 API calls 16708->16709 16710 240f319c 16709->16710 16710->16703 16712 240f3348 16711->16712 16713 240f3387 16711->16713 16714 240f30dc 16712->16714 16715 240f3352 16712->16715 16713->16597 16721 240f3148 6 API calls 16714->16721 16722 240f30f0 16714->16722 16716 240f337c 16715->16716 16717 240f3365 16715->16717 16718 240f36bc 6 API calls 16716->16718 16720 240f36bc 6 API calls 16717->16720 16724 240f336a 16718->16724 16719 240f311c 16719->16597 16720->16724 16721->16722 16722->16719 16723 240f135c 6 API calls 16722->16723 16723->16719 16724->16597 16730 240f3580 16725->16730 16727 240f35de 16728 240f3614 16727->16728 16729 240f36bc 6 API calls 16727->16729 16728->16617 16729->16728 16731 240f3540 16730->16731 16732 240f3148 6 API calls 16731->16732 16734 240f357a 16731->16734 16733 240f3557 16732->16733 16733->16734 16735 240f135c 6 API calls 16733->16735 16734->16727 16735->16734 16737 240f6c8d 16736->16737 16738 240f6cac FindFirstFileA 16737->16738 16739 240f6cb7 FindClose 16738->16739 16740 240f6cbf 16738->16740 16739->16740 16741 240f3088 6 API calls 16740->16741 16742 240f6cd4 16741->16742 16742->16634 16778 2410444c 16742->16778 16744 240f6c08 16743->16744 16745 240f6c32 16744->16745 16797 240f3388 16744->16797 16747 240f30ac 6 API calls 16745->16747 16748 240f6c5d 16747->16748 16749 240f6b28 GetLocalTime 16748->16749 16750 240f6b60 16749->16750 16751 240f3388 6 API calls 16750->16751 16752 240f6b8a 16750->16752 16751->16752 16753 240f30ac 6 API calls 16752->16753 16754 240f6bb5 16753->16754 16755 240f6b08 GetLocalTime 16754->16755 16756 240f6b23 16755->16756 16756->16644 16759 240f6948 16757->16759 16758 240f6972 16761 240f30ac 6 API calls 16758->16761 16759->16758 16760 240f3388 6 API calls 16759->16760 16760->16758 16762 240f699d 16761->16762 16763 240f69b8 GetLocalTime 16762->16763 16764 240f69f0 16763->16764 16765 240f6a1a 16764->16765 16766 240f3388 6 API calls 16764->16766 16767 240f30ac 6 API calls 16765->16767 16766->16765 16768 240f6a45 16767->16768 16769 240f33fc 16768->16769 16770 240f340d 16769->16770 16771 240f342d 16770->16771 16772 240f3441 16770->16772 16773 240f36bc 6 API calls 16771->16773 16774 240f3148 6 API calls 16772->16774 16775 240f343b 16773->16775 16774->16775 16776 240f3472 16775->16776 16777 240f30dc 6 API calls 16775->16777 16777->16776 16779 240f3088 6 API calls 16778->16779 16783 24104478 16779->16783 16780 24104511 16781 240f3088 6 API calls 16780->16781 16782 24104526 16781->16782 16782->16640 16783->16780 16785 240f3344 6 API calls 16783->16785 16812 240f3264 16783->16812 16785->16783 16787 240f6db8 16786->16787 16788 240f6de5 CreateFileA 16787->16788 16789 240f6e1f 16788->16789 16790 240f6df2 16788->16790 16794 240f30ac 6 API calls 16789->16794 16791 240f6df7 SetFilePointer 16790->16791 16792 240f6e03 16790->16792 16791->16792 16815 240f3588 16792->16815 16796 240f6e39 16794->16796 16796->16634 16798 240f338c 16797->16798 16801 240f33ed 16797->16801 16799 240f30dc 16798->16799 16800 240f3394 16798->16800 16804 240f3148 6 API calls 16799->16804 16807 240f30f0 16799->16807 16800->16801 16802 240f33a3 16800->16802 16805 240f30dc 6 API calls 16800->16805 16806 240f3148 6 API calls 16802->16806 16803 240f311c 16803->16745 16804->16807 16805->16802 16809 240f33bd 16806->16809 16807->16803 16808 240f135c 6 API calls 16807->16808 16808->16803 16810 240f30dc 6 API calls 16809->16810 16811 240f33e9 16810->16811 16811->16745 16813 240f3174 6 API calls 16812->16813 16814 240f3271 16813->16814 16814->16783 16816 240f3540 16815->16816 16817 240f357a WriteFile CloseHandle 16816->16817 16818 240f3148 6 API calls 16816->16818 16817->16789 16819 240f3557 16818->16819 16819->16817 16820 240f135c 6 API calls 16819->16820 16820->16817 16823 240f6a98 16821->16823 16822 240f6ac2 16825 240f30ac 6 API calls 16822->16825 16823->16822 16824 240f3388 6 API calls 16823->16824 16824->16822 16826 240f6aed 16825->16826 16826->16425 16827->16431 16877 24132464 42 API calls 16827->16877 16878 241182ac 158 API calls 16827->16878 16879 241184fc 158 API calls 16827->16879 16880 2413251c 158 API calls 16827->16880 16881 241300ac 51 API calls 16827->16881 16829 2411829b 16828->16829 16830 24118260 4 API calls 16829->16830 16831 241182a6 16829->16831 16830->16829 16831->16443 16833 240f6648 16832->16833 16834 240f6c78 8 API calls 16833->16834 16835 240f6662 16834->16835 16836 240f66bd 16835->16836 16837 240f667c GetFileAttributesA SetFileAttributesA DeleteFileA 16835->16837 16838 240f3088 6 API calls 16836->16838 16837->16836 16839 240f66d2 16838->16839 16839->16443 16841 24102640 16840->16841 16842 241027a4 16841->16842 16843 2410266f 16841->16843 16844 240f30ac 6 API calls 16842->16844 16882 240f673c 16843->16882 16846 241027be 16844->16846 16848 240f3088 6 API calls 16846->16848 16850 241027c6 16848->16850 16849 240f33fc 6 API calls 16851 241026a0 16849->16851 16850->16443 16852 240f6c78 8 API calls 16851->16852 16853 241026a8 16852->16853 16854 241026d1 16853->16854 16856 241026c3 CreateFileA CloseHandle 16853->16856 16855 240f6bd0 7 API calls 16854->16855 16857 241026d9 16855->16857 16856->16854 16858 240f6b28 7 API calls 16857->16858 16859 241026e9 16858->16859 16860 240f6b08 GetLocalTime 16859->16860 16861 241026f9 16860->16861 16862 240f6910 7 API calls 16861->16862 16863 24102709 16862->16863 16864 240f69b8 7 API calls 16863->16864 16865 24102719 16864->16865 16866 240f6a60 7 API calls 16865->16866 16867 24102729 16866->16867 16868 240f33fc 6 API calls 16867->16868 16869 24102750 16868->16869 16870 24102767 CreateFileA 16869->16870 16870->16842 16871 24102774 SetFilePointer 16870->16871 16872 2410278e 16871->16872 16873 240f3588 6 API calls 16872->16873 16874 24102797 WriteFile CloseHandle 16873->16874 16874->16842 16875->16443 16876->16446 16913 24132464 42 API calls 16876->16913 16914 241182ac 158 API calls 16876->16914 16915 241184fc 158 API calls 16876->16915 16916 2413251c 158 API calls 16876->16916 16917 241300ac 51 API calls 16876->16917 16891 240f3120 16882->16891 16885 240f3120 6 API calls 16886 240f676e 16885->16886 16895 240f70b8 16886->16895 16889 240f30ac 6 API calls 16890 240f679b 16889->16890 16890->16849 16893 240f3124 16891->16893 16892 240f3146 16892->16885 16893->16892 16894 240f135c 6 API calls 16893->16894 16894->16892 16896 240f70d3 16895->16896 16897 240f30dc 6 API calls 16896->16897 16898 240f70fb 16897->16898 16899 240f710b RegOpenKeyExA 16898->16899 16900 240f7116 16899->16900 16901 240f7174 16899->16901 16902 240f712a RegQueryValueExA 16900->16902 16903 240f30ac 6 API calls 16901->16903 16904 240f716b RegCloseKey 16902->16904 16905 240f713a 16902->16905 16906 240f718e 16903->16906 16904->16901 16907 240f36bc 6 API calls 16905->16907 16908 240f3088 6 API calls 16906->16908 16909 240f7144 16907->16909 16910 240f6781 16908->16910 16911 240f714f RegQueryValueExA 16909->16911 16910->16889 16912 240f36bc 6 API calls 16911->16912 16912->16904 16919 24102920 16918->16919 17131 24102a38 16919->17131 16921 2410293a 16922 24102950 socket htons inet_addr 16921->16922 16923 24102998 16922->16923 16924 241029b5 connect 16923->16924 16925 2410299e gethostbyname 16923->16925 16928 241029ef 16924->16928 16926 24102a05 16925->16926 16927 241029ab 16925->16927 16929 240f3088 6 API calls 16926->16929 16927->16924 16928->16926 16930 24102a1a 16929->16930 16930->16487 17139 240f4a8c 16931->17139 16934 240f61e8 16934->16501 16936 240f644c 16935->16936 16937 240f6c78 8 API calls 16936->16937 16938 240f6473 16937->16938 16939 240f6477 16938->16939 17141 240f63e8 16938->17141 17153 240f3a90 16939->17153 16944 240f3088 6 API calls 16946 240f6505 16944->16946 16946->16501 16948 2410474b 16947->16948 17187 24104538 16948->17187 16953 240f30dc 6 API calls 16954 24104791 16953->16954 16955 240f30ac 6 API calls 16954->16955 16956 241047ae 16955->16956 16956->16501 16958 2410ea08 16957->16958 16959 240f3120 6 API calls 16958->16959 16960 2410ea2e 16959->16960 17204 2410533c 16960->17204 16964 2410ea44 16965 2410ea55 16964->16965 16966 2410ea5b ExitProcess 16964->16966 16967 240f30dc 6 API calls 16965->16967 16968 2410ea6f 16967->16968 16969 240f30dc 6 API calls 16968->16969 16970 2410ea7c 16969->16970 16971 240f30dc 6 API calls 16970->16971 16972 2410ea89 16971->16972 16973 240f3588 6 API calls 16972->16973 16974 2410ea91 16973->16974 16975 240f3588 6 API calls 16974->16975 16976 2410ea9e 16975->16976 16977 240f3588 6 API calls 16976->16977 16978 2410eaab 16977->16978 17216 24103ddc 16978->17216 16981 24103ddc 20 API calls 16982 2410eace 16981->16982 16983 24103ddc 20 API calls 16982->16983 16984 2410eae2 16983->16984 16985 2410eafa 16984->16985 17242 24104158 16984->17242 16987 240f30ac 6 API calls 16985->16987 16990 2410ebc5 16987->16990 16989 24104158 6 API calls 16991 2410eb22 16989->16991 16992 240f3088 6 API calls 16990->16992 16993 24104158 6 API calls 16991->16993 16994 2410ebcd 16992->16994 16995 2410eb32 16993->16995 16994->16501 16996 24104158 6 API calls 16995->16996 16997 2410eb42 16996->16997 16998 24104158 6 API calls 16997->16998 16999 2410eb52 16998->16999 17000 24104158 6 API calls 16999->17000 17001 2410eb62 17000->17001 17002 24104158 6 API calls 17001->17002 17003 2410eb72 17002->17003 17004 24104158 6 API calls 17003->17004 17005 2410eb82 17004->17005 17255 2410cd48 17005->17255 17008 24118f40 17007->17008 17009 24118f5b 17008->17009 17010 24118298 4 API calls 17008->17010 17011 24118fdd 17009->17011 18097 24116114 17009->18097 17010->17008 17012 240f30ac 6 API calls 17011->17012 17014 24119015 17012->17014 17014->16501 17016 240f3120 6 API calls 17017 24118f87 17016->17017 17018 24104720 6 API calls 17017->17018 17019 24118f97 17018->17019 17020 240f3120 6 API calls 17019->17020 17021 24118fa2 17020->17021 17022 240f33fc 6 API calls 17021->17022 17023 24118fcf 17022->17023 17024 24102d34 28 API calls 17023->17024 17025 24118fd9 17024->17025 17025->17011 18109 24102cec send 17025->18109 17028 24102b91 17027->17028 17029 24102bba 17027->17029 17030 24102ba6 select 17028->17030 17031 24102bd8 select 17029->17031 17032 24102be9 17030->17032 17031->17032 17032->16501 17034 241195fc 17033->17034 17034->17034 17035 240f3088 6 API calls 17034->17035 17036 24119622 17035->17036 17037 241197f0 17036->17037 17040 240f3088 6 API calls 17036->17040 17038 240f30ac 6 API calls 17037->17038 17039 2411a325 17038->17039 17041 240f3088 6 API calls 17039->17041 17042 24119641 17040->17042 17043 2411a32d 17041->17043 18126 24102ca4 17042->18126 17045 240f30ac 6 API calls 17043->17045 17046 2411a33a 17045->17046 17046->16501 17047 2411964c 17048 240f35d0 6 API calls 17047->17048 17049 2411967d 17047->17049 17048->17049 17050 240f35d0 6 API calls 17049->17050 17051 241196ae 17049->17051 17050->17051 17052 241196df 17051->17052 17053 240f35d0 6 API calls 17051->17053 17054 240f3590 6 API calls 17052->17054 17053->17052 17055 24119703 17054->17055 17056 241197f5 17055->17056 17057 24119719 17055->17057 17058 24102d34 28 API calls 17056->17058 17059 240f35d0 6 API calls 17057->17059 17061 24119802 17058->17061 17060 24119735 17059->17060 17063 240f3590 6 API calls 17060->17063 17061->17037 17062 240f3590 6 API calls 17061->17062 17064 2411982e 17062->17064 17068 24119759 17063->17068 17065 24119840 17064->17065 17066 24119872 17064->17066 17067 24102638 24 API calls 17065->17067 17073 240f3590 6 API calls 17066->17073 17069 2411984a 17067->17069 17070 24119771 GetTickCount 17068->17070 17071 240f30dc 6 API calls 17069->17071 17072 240f794c 9 API calls 17070->17072 17074 24119857 17071->17074 17075 2411978b 17072->17075 17076 24119896 17073->17076 18139 240f78c8 CreateThread SetThreadPriority 17074->18139 18137 240f5b14 GetLastInputInfo GetTickCount 17075->18137 17080 241198a8 17076->17080 17081 241198de 17076->17081 17079 2411979b 17085 240f33fc 6 API calls 17079->17085 17083 240f33fc 6 API calls 17080->17083 18140 241047bc 17081->18140 17086 241198c9 17083->17086 17084 241198e9 17091 240f3590 6 API calls 17084->17091 17088 241197c6 17085->17088 17087 24118f28 32 API calls 17086->17087 17087->17037 17089 24102d34 28 API calls 17088->17089 17090 241197d1 17089->17090 17090->17037 18138 240f78c8 CreateThread SetThreadPriority 17090->18138 17097 2411990a 17091->17097 17093 2411a136 17094 240f30dc 6 API calls 17093->17094 17095 2411a143 17094->17095 18151 240f78c8 CreateThread SetThreadPriority 17095->18151 17097->17093 17098 2411a15e 17097->17098 17098->17037 17099 240f3590 6 API calls 17098->17099 17100 2411a1af 17099->17100 18152 240f58f0 17100->18152 17102 2411a1ba 17103 240f35d0 6 API calls 17102->17103 17111 2411a1fa 17103->17111 17104 2411a2bf 17105 24104720 6 API calls 17104->17105 17106 2411a2dc 17105->17106 17107 240f30dc 6 API calls 17106->17107 17108 2411a2ea 17107->17108 18177 24116208 17108->18177 17109 2411a2b4 18171 24103024 17109->18171 17111->17104 17111->17109 17114 2411a223 17111->17114 18156 240f5b00 17114->18156 17115 240f30dc 6 API calls 17115->17037 17119 2411a249 17119->16501 17121 24102d41 17120->17121 17122 24102cec 28 API calls 17121->17122 17123 24102d4c 17122->17123 17123->16501 17124->16491 17126 24117ce3 17125->17126 17127 240f30dc 6 API calls 17126->17127 17128 24117cfe 17127->17128 17129 240f3088 6 API calls 17128->17129 17130 24117d13 Sleep 17129->17130 17130->16504 17132 24102a4f 17131->17132 17133 24102638 24 API calls 17132->17133 17134 24102a65 shutdown 17133->17134 17135 24102a9c closesocket 17134->17135 17136 24102aca 17135->17136 17137 240f3088 6 API calls 17136->17137 17138 24102adf 17137->17138 17138->16921 17140 240f4a90 LoadLibraryA GetProcAddress 17139->17140 17140->16934 17157 240f3534 17141->17157 17144 240f6428 GetLastError 17147 240f6426 17144->17147 17145 240f6412 17159 240f5df8 17145->17159 17150 240f5ddc 17147->17150 17148 240f6419 17148->17147 17149 240f5ddc FindClose 17148->17149 17149->17147 17151 240f5de7 FindClose 17150->17151 17152 240f5df4 17150->17152 17151->17152 17152->16939 17154 240f3aa2 17153->17154 17156 240f3abb 17154->17156 17165 240f3ac4 17154->17165 17156->16944 17158 240f3538 FindFirstFileA 17157->17158 17158->17144 17158->17145 17160 240f5e18 17159->17160 17161 240f5e00 FindNextFileA 17160->17161 17162 240f5e20 FileTimeToLocalFileTime FileTimeToDosDateTime 17160->17162 17161->17160 17163 240f5e11 GetLastError 17161->17163 17164 240f5e55 17162->17164 17163->17164 17164->17148 17166 240f3acd 17165->17166 17176 240f3b02 17165->17176 17167 240f3b07 17166->17167 17172 240f3ae2 17166->17172 17168 240f3b0e 17167->17168 17169 240f3b18 17167->17169 17170 240f3088 6 API calls 17168->17170 17171 240f30ac 6 API calls 17169->17171 17170->17176 17171->17176 17173 240f3aee 17172->17173 17174 240f3b4c 17172->17174 17172->17176 17175 240f3b6a 17173->17175 17180 240f3af2 17173->17180 17174->17176 17177 240f3ac4 6 API calls 17174->17177 17175->17176 17178 240f3a90 6 API calls 17175->17178 17176->17154 17177->17174 17178->17175 17180->17176 17181 240f4500 17180->17181 17183 240f4506 17181->17183 17185 240f4537 17181->17185 17182 240f452f 17184 240f135c 6 API calls 17182->17184 17183->17182 17183->17185 17186 240f3ac4 6 API calls 17183->17186 17184->17185 17185->17180 17186->17182 17188 2410454f 17187->17188 17189 240f3088 6 API calls 17188->17189 17190 2410460d 17189->17190 17191 2410461c 17190->17191 17196 2410463b 17191->17196 17192 241046e0 17193 240f30dc 6 API calls 17192->17193 17194 241046eb 17193->17194 17195 240f3088 6 API calls 17194->17195 17197 24104700 17195->17197 17196->17192 17198 240f3264 6 API calls 17196->17198 17201 240f3344 6 API calls 17196->17201 17199 240f3088 6 API calls 17197->17199 17198->17196 17200 24104708 17199->17200 17202 240f3088 6 API calls 17200->17202 17201->17196 17203 24104710 17202->17203 17203->16953 17205 24105350 17204->17205 17206 240f3088 6 API calls 17205->17206 17207 241053a1 17206->17207 17208 241053b0 17207->17208 17209 240f3088 6 API calls 17208->17209 17211 241053e1 17209->17211 17210 240f3264 6 API calls 17210->17211 17211->17210 17212 240f33fc 6 API calls 17211->17212 17213 24105430 17211->17213 17212->17211 17214 240f30ac 6 API calls 17213->17214 17215 2410544a 17214->17215 17215->16964 17217 24103e12 17216->17217 17218 24103e36 17217->17218 17219 24103e1a 17217->17219 17221 24103e73 VirtualAlloc 17218->17221 17222 24103e57 17218->17222 17220 240f30dc 6 API calls 17219->17220 17238 24103e29 17220->17238 17224 24103e93 VirtualAlloc 17221->17224 17225 24103eaa 17221->17225 17223 240f30dc 6 API calls 17222->17223 17223->17238 17224->17225 17226 24103eca GetProcessHeap RtlAllocateHeap VirtualAlloc VirtualAlloc 17225->17226 17227 24103eae 17225->17227 17229 24103f35 17226->17229 17228 240f30dc 6 API calls 17227->17228 17228->17238 17258 2410388c 17229->17258 17231 24103f57 17263 24103a08 17231->17263 17234 24103f89 17278 24103cec 17234->17278 17235 240f3344 6 API calls 17235->17234 17238->16981 17239 24103fb7 17239->17238 17241 240f30dc 6 API calls 17239->17241 17240 240f30dc 6 API calls 17240->17239 17241->17238 17243 2410417f 17242->17243 17244 24104185 17243->17244 17245 24104199 17243->17245 17246 240f30dc 6 API calls 17244->17246 17247 241041b2 17245->17247 17252 241041c6 17245->17252 17248 24104194 17246->17248 17249 240f30dc 6 API calls 17247->17249 17248->16989 17249->17248 17250 24104212 17253 240f30dc 6 API calls 17250->17253 17251 24104223 17251->17248 17254 240f30dc 6 API calls 17251->17254 17252->17250 17252->17251 17253->17248 17254->17248 17288 241056d8 17255->17288 17257 2410cd4d 17257->16985 17262 241038a6 17258->17262 17259 24103926 17259->17231 17260 241038f4 VirtualAlloc 17260->17262 17261 241038c9 VirtualAlloc 17261->17262 17262->17259 17262->17260 17262->17261 17269 24103a3f 17263->17269 17264 24103b9c IsBadReadPtr 17264->17269 17273 24103a98 17264->17273 17265 240f3088 6 API calls 17266 24103bd0 17265->17266 17266->17234 17266->17235 17267 24103a56 LoadLibraryA 17268 24103a70 17267->17268 17267->17269 17271 240f3388 6 API calls 17268->17271 17269->17264 17269->17267 17272 24103ad1 17269->17272 17269->17273 17275 24103b61 GetProcAddress 17269->17275 17276 24103b3b GetProcAddress 17269->17276 17277 240f30dc 6 API calls 17269->17277 17285 241039c4 17269->17285 17271->17273 17274 240f30dc 6 API calls 17272->17274 17273->17265 17274->17273 17275->17269 17276->17269 17277->17269 17281 24103cfe 17278->17281 17279 24103d98 17279->17238 17279->17239 17279->17240 17280 24103d19 VirtualFree 17280->17281 17281->17279 17281->17280 17282 24103d73 VirtualProtect 17281->17282 17282->17281 17283 24103d89 17282->17283 17284 240f30dc 6 API calls 17283->17284 17284->17279 17286 240f1344 6 API calls 17285->17286 17287 241039cf 17286->17287 17287->17269 17289 241056f5 17288->17289 17290 2410742e 17288->17290 18078 241055b4 17289->18078 17290->17257 17295 2410562c 7 API calls 17296 2410572d 17295->17296 17297 2410562c 7 API calls 17296->17297 17298 24105740 17297->17298 17299 2410562c 7 API calls 17298->17299 17300 24105753 17299->17300 17301 2410562c 7 API calls 17300->17301 17302 24105766 17301->17302 17303 2410562c 7 API calls 17302->17303 17304 24105779 17303->17304 17305 2410562c 7 API calls 17304->17305 17306 2410578c 17305->17306 17307 2410562c 7 API calls 17306->17307 17308 2410579f 17307->17308 17309 2410562c 7 API calls 17308->17309 17310 241057b2 17309->17310 17311 2410562c 7 API calls 17310->17311 17312 241057c5 17311->17312 17313 2410562c 7 API calls 17312->17313 17314 241057d8 17313->17314 17315 2410562c 7 API calls 17314->17315 17316 241057eb 17315->17316 17317 2410562c 7 API calls 17316->17317 17318 241057fe 17317->17318 17319 2410562c 7 API calls 17318->17319 17320 24105811 17319->17320 17321 2410562c 7 API calls 17320->17321 17322 24105824 17321->17322 17323 2410562c 7 API calls 17322->17323 17324 24105837 17323->17324 17325 2410562c 7 API calls 17324->17325 17326 2410584a 17325->17326 17327 2410562c 7 API calls 17326->17327 17328 2410585d 17327->17328 17329 2410562c 7 API calls 17328->17329 17330 24105870 17329->17330 17331 2410562c 7 API calls 17330->17331 17332 24105883 17331->17332 17333 2410562c 7 API calls 17332->17333 17334 24105896 17333->17334 17335 2410562c 7 API calls 17334->17335 17336 241058a9 17335->17336 17337 2410562c 7 API calls 17336->17337 17338 241058bc 17337->17338 17339 2410562c 7 API calls 17338->17339 17340 241058cf 17339->17340 17341 2410562c 7 API calls 17340->17341 17342 241058e2 17341->17342 17343 2410562c 7 API calls 17342->17343 17344 241058f5 17343->17344 17345 2410562c 7 API calls 17344->17345 17346 24105908 17345->17346 17347 2410562c 7 API calls 17346->17347 17348 2410591b 17347->17348 17349 2410562c 7 API calls 17348->17349 17350 2410592e 17349->17350 17351 2410562c 7 API calls 17350->17351 17352 24105941 17351->17352 17353 2410562c 7 API calls 17352->17353 17354 24105954 17353->17354 17355 2410562c 7 API calls 17354->17355 17356 24105967 17355->17356 17357 2410562c 7 API calls 17356->17357 17358 2410597a 17357->17358 17359 2410562c 7 API calls 17358->17359 17360 2410598d 17359->17360 17361 2410562c 7 API calls 17360->17361 17362 241059a0 17361->17362 17363 2410562c 7 API calls 17362->17363 17364 241059b3 17363->17364 17365 2410562c 7 API calls 17364->17365 17366 241059c6 17365->17366 17367 2410562c 7 API calls 17366->17367 17368 241059d9 17367->17368 17369 2410562c 7 API calls 17368->17369 17370 241059ec 17369->17370 17371 2410562c 7 API calls 17370->17371 17372 241059ff 17371->17372 17373 2410562c 7 API calls 17372->17373 17374 24105a12 17373->17374 17375 2410562c 7 API calls 17374->17375 17376 24105a25 17375->17376 17377 2410562c 7 API calls 17376->17377 17378 24105a38 17377->17378 17379 2410562c 7 API calls 17378->17379 17380 24105a4b 17379->17380 17381 2410562c 7 API calls 17380->17381 17382 24105a5e 17381->17382 17383 2410562c 7 API calls 17382->17383 17384 24105a71 17383->17384 17385 2410562c 7 API calls 17384->17385 17386 24105a84 17385->17386 17387 2410562c 7 API calls 17386->17387 17388 24105a97 17387->17388 17389 2410562c 7 API calls 17388->17389 17390 24105aaa 17389->17390 17391 2410562c 7 API calls 17390->17391 17392 24105abd 17391->17392 17393 2410562c 7 API calls 17392->17393 17394 24105ad0 17393->17394 17395 2410562c 7 API calls 17394->17395 17396 24105ae3 17395->17396 17397 2410562c 7 API calls 17396->17397 17398 24105af6 17397->17398 17399 2410562c 7 API calls 17398->17399 17400 24105b09 17399->17400 17401 2410562c 7 API calls 17400->17401 17402 24105b1c 17401->17402 17403 2410562c 7 API calls 17402->17403 17404 24105b2f 17403->17404 17405 2410562c 7 API calls 17404->17405 17406 24105b42 17405->17406 17407 2410562c 7 API calls 17406->17407 17408 24105b55 17407->17408 17409 2410562c 7 API calls 17408->17409 17410 24105b68 17409->17410 17411 2410562c 7 API calls 17410->17411 17412 24105b7b 17411->17412 17413 2410562c 7 API calls 17412->17413 17414 24105b8e 17413->17414 17415 2410562c 7 API calls 17414->17415 17416 24105ba1 17415->17416 17417 2410562c 7 API calls 17416->17417 17418 24105bb4 17417->17418 17419 2410562c 7 API calls 17418->17419 17420 24105bc7 17419->17420 17421 2410562c 7 API calls 17420->17421 17422 24105bda 17421->17422 17423 2410562c 7 API calls 17422->17423 17424 24105bed 17423->17424 17425 2410562c 7 API calls 17424->17425 17426 24105c00 17425->17426 17427 2410562c 7 API calls 17426->17427 17428 24105c13 17427->17428 17429 2410562c 7 API calls 17428->17429 17430 24105c26 17429->17430 17431 2410562c 7 API calls 17430->17431 17432 24105c39 17431->17432 17433 2410562c 7 API calls 17432->17433 17434 24105c4c 17433->17434 17435 2410562c 7 API calls 17434->17435 17436 24105c5f 17435->17436 17437 2410562c 7 API calls 17436->17437 17438 24105c72 17437->17438 17439 2410562c 7 API calls 17438->17439 17440 24105c85 17439->17440 17441 2410562c 7 API calls 17440->17441 17442 24105c98 17441->17442 17443 2410562c 7 API calls 17442->17443 17444 24105cab 17443->17444 17445 2410562c 7 API calls 17444->17445 17446 24105cbe 17445->17446 17447 2410562c 7 API calls 17446->17447 17448 24105cd1 17447->17448 17449 2410562c 7 API calls 17448->17449 17450 24105ce4 17449->17450 17451 2410562c 7 API calls 17450->17451 17452 24105cf7 17451->17452 17453 2410562c 7 API calls 17452->17453 17454 24105d0a 17453->17454 17455 2410562c 7 API calls 17454->17455 17456 24105d1d 17455->17456 17457 2410562c 7 API calls 17456->17457 17458 24105d30 17457->17458 17459 2410562c 7 API calls 17458->17459 17460 24105d43 17459->17460 17461 2410562c 7 API calls 17460->17461 17462 24105d56 17461->17462 17463 2410562c 7 API calls 17462->17463 17464 24105d69 17463->17464 17465 2410562c 7 API calls 17464->17465 17466 24105d7c 17465->17466 17467 2410562c 7 API calls 17466->17467 17468 24105d8f 17467->17468 17469 2410562c 7 API calls 17468->17469 17470 24105da2 17469->17470 17471 2410562c 7 API calls 17470->17471 17472 24105db5 17471->17472 17473 2410562c 7 API calls 17472->17473 17474 24105dc8 17473->17474 17475 2410562c 7 API calls 17474->17475 17476 24105ddb 17475->17476 17477 2410562c 7 API calls 17476->17477 17478 24105dee 17477->17478 17479 2410562c 7 API calls 17478->17479 17480 24105e01 17479->17480 17481 2410562c 7 API calls 17480->17481 17482 24105e14 17481->17482 17483 2410562c 7 API calls 17482->17483 17484 24105e27 17483->17484 17485 2410562c 7 API calls 17484->17485 17486 24105e3a 17485->17486 17487 2410562c 7 API calls 17486->17487 17488 24105e4d 17487->17488 17489 2410562c 7 API calls 17488->17489 17490 24105e60 17489->17490 17491 2410562c 7 API calls 17490->17491 17492 24105e73 17491->17492 17493 2410562c 7 API calls 17492->17493 17494 24105e86 17493->17494 17495 2410562c 7 API calls 17494->17495 17496 24105e99 17495->17496 17497 2410562c 7 API calls 17496->17497 17498 24105eac 17497->17498 17499 2410562c 7 API calls 17498->17499 17500 24105ebf 17499->17500 17501 2410562c 7 API calls 17500->17501 17502 24105ed2 17501->17502 17503 2410562c 7 API calls 17502->17503 17504 24105ee5 17503->17504 17505 2410562c 7 API calls 17504->17505 17506 24105ef8 17505->17506 17507 2410562c 7 API calls 17506->17507 17508 24105f0b 17507->17508 17509 2410562c 7 API calls 17508->17509 17510 24105f1e 17509->17510 17511 2410562c 7 API calls 17510->17511 17512 24105f31 17511->17512 17513 2410562c 7 API calls 17512->17513 17514 24105f44 17513->17514 18080 241055c6 18078->18080 18079 241055e9 18081 240f3088 6 API calls 18079->18081 18080->18079 18083 241055e1 LoadLibraryA 18080->18083 18082 24105606 18081->18082 18082->17290 18084 2410562c 18082->18084 18083->18079 18086 24105642 18084->18086 18085 24105667 18088 240f3088 6 API calls 18085->18088 18086->18085 18087 2410565e GetProcAddress 18086->18087 18087->18085 18089 2410568d 18088->18089 18089->17295 18098 24116130 18097->18098 18114 24103334 18098->18114 18100 24116193 18120 241160d8 18100->18120 18103 240f3388 6 API calls 18104 241161b4 18103->18104 18105 240f3088 6 API calls 18104->18105 18106 241161d7 18105->18106 18107 240f3088 6 API calls 18106->18107 18108 241161df 18107->18108 18108->17016 18110 24102d10 18109->18110 18111 24102d04 WSAGetLastError 18109->18111 18110->17011 18111->18110 18112 24102d15 18111->18112 18113 24102a38 26 API calls 18112->18113 18113->18110 18115 24103348 18114->18115 18116 240f1344 6 API calls 18115->18116 18117 2410339c 18116->18117 18118 240f135c 6 API calls 18117->18118 18119 24103410 18118->18119 18119->18100 18121 241160e6 18120->18121 18122 240f36bc 6 API calls 18121->18122 18123 241160fc 18122->18123 18124 240f3588 6 API calls 18123->18124 18125 24116103 18124->18125 18125->18103 18127 240f3088 6 API calls 18126->18127 18128 24102cb1 18127->18128 18129 24102bf4 28 API calls 18128->18129 18130 24102cbd 18129->18130 18131 24102ce7 18130->18131 18132 240f36bc 6 API calls 18130->18132 18131->17047 18133 24102cc9 18132->18133 18134 24102bf4 28 API calls 18133->18134 18135 24102cdb 18134->18135 18135->18131 18136 240f36bc 6 API calls 18135->18136 18136->18131 18137->17079 18138->17037 18193 24132464 42 API calls 18138->18193 18194 241182ac 158 API calls 18138->18194 18195 241184fc 158 API calls 18138->18195 18196 2413251c 158 API calls 18138->18196 18197 241300ac 51 API calls 18138->18197 18139->17037 18198 24132464 42 API calls 18139->18198 18199 241182ac 158 API calls 18139->18199 18200 241184fc 158 API calls 18139->18200 18201 2413251c 158 API calls 18139->18201 18202 241300ac 51 API calls 18139->18202 18141 241047db 18140->18141 18142 240f3088 6 API calls 18141->18142 18149 241047f1 18142->18149 18143 2410489c 18144 240f30ac 6 API calls 18143->18144 18145 241048b6 18144->18145 18146 240f3088 6 API calls 18145->18146 18147 241048be 18146->18147 18147->17084 18148 240f3264 6 API calls 18148->18149 18149->18143 18149->18148 18150 240f3344 6 API calls 18149->18150 18150->18149 18151->17037 18203 24132464 42 API calls 18151->18203 18204 241182ac 158 API calls 18151->18204 18205 241184fc 158 API calls 18151->18205 18206 2413251c 158 API calls 18151->18206 18207 241300ac 51 API calls 18151->18207 18153 240f5901 18152->18153 18154 240f3088 6 API calls 18153->18154 18155 240f5935 18154->18155 18155->17102 18158 240f5b03 18156->18158 18159 240f5b0e 18158->18159 18208 240f5ac8 PeekMessageA 18158->18208 18160 24102bf4 18159->18160 18161 24102c03 ioctlsocket 18160->18161 18164 24102c2a 18160->18164 18162 24102c15 18161->18162 18165 24102c28 18161->18165 18163 24102a38 26 API calls 18162->18163 18163->18165 18166 24102c4c 18164->18166 18167 24102a38 26 API calls 18164->18167 18165->17119 18166->18165 18168 24102c52 WSAGetLastError 18166->18168 18167->18166 18168->18165 18169 24102c6a 18168->18169 18170 24102a38 26 API calls 18169->18170 18170->18165 18172 24103032 18171->18172 18173 240f36bc 6 API calls 18172->18173 18174 24103048 18173->18174 18175 240f3588 6 API calls 18174->18175 18176 2410304f 18175->18176 18176->17104 18178 2411622d 18177->18178 18179 240f3088 6 API calls 18178->18179 18180 24116243 18179->18180 18192 24116301 18180->18192 18212 240f62ec 18180->18212 18181 240f3088 6 API calls 18183 24116329 18181->18183 18185 240f3088 6 API calls 18183->18185 18187 24116331 18185->18187 18186 240f3120 6 API calls 18190 2411627c 18186->18190 18187->17115 18188 240f5b00 4 API calls 18188->18190 18189 241162ef 18191 241160d8 6 API calls 18189->18191 18190->18188 18190->18189 18191->18192 18192->18181 18209 240f5af4 Sleep 18208->18209 18210 240f5ae0 18208->18210 18209->18158 18210->18209 18211 240f5ae8 TranslateMessage DispatchMessageA 18210->18211 18211->18209 18213 240f6310 18212->18213 18214 240f3120 6 API calls 18213->18214 18215 240f6343 18214->18215 18216 240f3088 6 API calls 18215->18216 18221 240f634b 18216->18221 18217 240f3344 6 API calls 18217->18221 18218 240f63b0 18219 240f30dc 6 API calls 18218->18219 18220 240f63bb 18219->18220 18222 240f30ac 6 API calls 18220->18222 18221->18217 18221->18218 18224 240f3590 6 API calls 18221->18224 18223 240f63d5 18222->18223 18223->18186 18224->18221 18225->16524 18226 24132464 42 API calls 18225->18226 18227 241182ac 158 API calls 18225->18227 18228 241184fc 158 API calls 18225->18228 18229 2413251c 158 API calls 18225->18229 18230 241300ac 51 API calls 18225->18230 18232 240f659a 18231->18232 18320 240f6518 18232->18320 18235 240f65bf 18236 240f6518 6 API calls 18235->18236 18248 240f65e9 18235->18248 18238 240f65cc 18236->18238 18237 240f6518 6 API calls 18237->18235 18239 240f65cf 18238->18239 18240 240f65eb 18238->18240 18241 240f6518 6 API calls 18239->18241 18242 240f6518 6 API calls 18240->18242 18244 240f65da 18241->18244 18245 240f65f5 18242->18245 18243 240f3088 6 API calls 18246 240f6627 GetTickCount 18243->18246 18247 240f3590 6 API calls 18244->18247 18245->18248 18249 240f6518 6 API calls 18245->18249 18246->16539 18247->18248 18248->18243 18250 240f6603 18249->18250 18251 240f3590 6 API calls 18250->18251 18251->18248 18253 240f6cfd 18252->18253 18254 240f3088 6 API calls 18253->18254 18255 240f6d13 18254->18255 18256 240f6c78 8 API calls 18255->18256 18257 240f6d1b 18256->18257 18258 240f6d7c 18257->18258 18260 240f6d36 CreateFileA GetFileSize 18257->18260 18259 240f3088 6 API calls 18258->18259 18261 240f6d91 18259->18261 18262 240f1344 6 API calls 18260->18262 18261->16545 18263 240f6d4f ReadFile 18262->18263 18264 240f3174 6 API calls 18263->18264 18265 240f6d6d 18264->18265 18266 240f135c 6 API calls 18265->18266 18267 240f6d76 CloseHandle 18266->18267 18267->18258 18324 240f6fac 18268->18324 18271 240f3590 6 API calls 18272 240f7095 18271->18272 18273 240f3088 6 API calls 18272->18273 18274 240f70aa 18273->18274 18275 24101b5c 18274->18275 18276 24101b70 18275->18276 18277 240f3088 6 API calls 18276->18277 18278 24101b85 18277->18278 18279 24101ba3 GetVolumeInformationA 18278->18279 18333 24101a5c 18279->18333 18282 240f3088 6 API calls 18283 24101bcd 18282->18283 18283->16551 18285 24102144 18284->18285 18286 240f30dc 6 API calls 18285->18286 18287 24102184 18286->18287 18288 240f30dc 6 API calls 18287->18288 18289 2410218f 18288->18289 18290 240f30dc 6 API calls 18289->18290 18291 2410219a 18290->18291 18354 240f15e0 18291->18354 18295 241021af 18296 241021bf InternetOpenA 18295->18296 18297 24102200 18296->18297 18299 241021ce 18296->18299 18298 240f30ac 6 API calls 18297->18298 18300 2410222f 18298->18300 18303 241021f6 InternetConnectA 18299->18303 18301 240f30ac 6 API calls 18300->18301 18302 2410223c 18301->18302 18302->16572 18304 241022a8 18302->18304 18303->18297 18305 241022ba 18304->18305 18306 241022e4 18305->18306 18307 241022d6 FtpSetCurrentDirectoryA 18305->18307 18308 240f3088 6 API calls 18306->18308 18307->18306 18309 24102301 18308->18309 18309->16572 18310 241023c4 18309->18310 18314 241023dd 18310->18314 18311 241024eb 18312 240f30ac 6 API calls 18311->18312 18313 24102505 18312->18313 18313->16572 18314->18311 18315 24102429 FtpOpenFileA 18314->18315 18315->18311 18316 24102443 18315->18316 18317 240f3588 6 API calls 18316->18317 18319 241024c9 InternetCloseHandle 18316->18319 18318 24102486 InternetWriteFile 18317->18318 18318->18316 18319->16572 18321 240f652c 18320->18321 18322 240f3088 6 API calls 18321->18322 18323 240f6578 18322->18323 18323->18235 18323->18237 18331 240f6e90 LoadLibraryA GetProcAddress 18324->18331 18326 240f6fde 18327 240f3388 6 API calls 18326->18327 18328 240f7006 18327->18328 18329 240f3088 6 API calls 18328->18329 18330 240f701e 18329->18330 18330->18271 18332 240f6eaf 18331->18332 18332->18326 18334 240f3088 6 API calls 18333->18334 18337 24101a7f 18334->18337 18335 24101aae 18339 24101ab3 18335->18339 18340 24101ad0 18335->18340 18336 240f3264 6 API calls 18336->18337 18337->18335 18337->18336 18338 240f3388 6 API calls 18337->18338 18338->18337 18341 24101ace 18339->18341 18342 240f3388 6 API calls 18339->18342 18343 240f35d0 6 API calls 18340->18343 18349 24101b06 18340->18349 18344 240f3088 6 API calls 18341->18344 18342->18339 18345 24101af5 18343->18345 18347 24101b36 18344->18347 18350 240f3618 18345->18350 18346 240f3388 6 API calls 18346->18349 18347->18282 18349->18341 18349->18346 18351 240f361c 18350->18351 18353 240f3647 18350->18353 18352 240f36bc 6 API calls 18351->18352 18352->18353 18353->18349 18355 240f3088 6 API calls 18354->18355 18356 240f15f4 18355->18356 18357 240f15f8 GetModuleFileNameA 18356->18357 18358 240f1616 GetCommandLineA 18356->18358 18359 240f3174 6 API calls 18357->18359 18363 240f161d 18358->18363 18360 240f1614 18359->18360 18362 240f1634 18360->18362 18364 240f5878 18362->18364 18363->18362 18368 240f14f4 18363->18368 18365 240f5888 18364->18365 18366 240f58af 18365->18366 18367 240f3590 6 API calls 18365->18367 18366->18295 18367->18366 18369 240f1506 18368->18369 18370 240f14fe CharNextA 18369->18370 18375 240f1520 18369->18375 18370->18369 18371 240f156f 18372 240f36bc 6 API calls 18371->18372 18381 240f1578 18372->18381 18373 240f155b CharNextA 18373->18375 18374 240f152a CharNextA 18374->18375 18375->18371 18375->18373 18375->18374 18376 240f1534 CharNextA 18375->18376 18377 240f1551 CharNextA 18375->18377 18376->18375 18377->18375 18378 240f15d7 18378->18363 18379 240f15bc CharNextA 18379->18381 18380 240f1584 CharNextA 18380->18381 18381->18378 18381->18379 18381->18380 18382 240f158e CharNextA 18381->18382 18383 240f15b2 CharNextA 18381->18383 18382->18381 18383->18381 18385 240f4dc7 18384->18385 18648 240f2e08 18385->18648 18387 240f4e01 18387->16264 18389 240f7bf6 18388->18389 18655 240f7aa0 18389->18655 18391 240f3088 6 API calls 18395 240f7c14 18391->18395 18392 240f7c60 18394 240f3088 6 API calls 18392->18394 18396 240f7c75 18394->18396 18395->18391 18395->18392 18397 240f30dc 6 API calls 18395->18397 18672 240f7a24 18395->18672 18398 240f4500 6 API calls 18396->18398 18397->18395 18399 240f7c83 18398->18399 18400 240f3088 6 API calls 18399->18400 18401 240f7c8b 18400->18401 18402 240f7da8 18401->18402 18403 240f7dbe 18402->18403 18404 240f30dc 6 API calls 18403->18404 18405 240f7dd0 18403->18405 18404->18403 18406 240f30dc 6 API calls 18405->18406 18407 240f7ddd 18406->18407 18408 240f30dc 6 API calls 18407->18408 18409 240f7dea 18408->18409 18750 240f7d0c 18409->18750 18412 240f58f0 6 API calls 18413 240f7dff 18412->18413 18414 240f30dc 6 API calls 18413->18414 18415 240f7e11 18414->18415 18416 240f30dc 6 API calls 18415->18416 18417 240f7e1e 18416->18417 18418 240f30dc 6 API calls 18417->18418 18419 240f7e2b 18418->18419 18420 240f30dc 6 API calls 18419->18420 18421 240f7e38 18420->18421 18422 240f30dc 6 API calls 18421->18422 18423 240f7e45 18422->18423 18424 240f30dc 6 API calls 18423->18424 18425 240f7e52 18424->18425 18426 240f7d0c 6 API calls 18425->18426 18427 240f7e5a 18426->18427 18428 240f58f0 6 API calls 18427->18428 18429 240f7e67 18428->18429 18430 240f58f0 6 API calls 18429->18430 18431 240f7e77 18430->18431 18432 240f30dc 6 API calls 18431->18432 18433 240f7e8c 18432->18433 18434 240f30dc 6 API calls 18433->18434 18435 240f7e9c 18434->18435 18436 240f7d0c 6 API calls 18435->18436 18437 240f7ea7 18436->18437 18438 240f7d0c 6 API calls 18437->18438 18439 240f7eb7 18438->18439 18440 240f7d0c 6 API calls 18439->18440 18441 240f7ec7 18440->18441 18442 240f30dc 6 API calls 18441->18442 18443 240f7edc 18442->18443 18444 240f30dc 6 API calls 18443->18444 18445 240f7eec 18444->18445 18446 240f30dc 6 API calls 18445->18446 18447 240f7efc 18446->18447 18448 240f30dc 6 API calls 18447->18448 18449 240f7f0c 18448->18449 18450 240f58f0 6 API calls 18449->18450 18451 240f7f17 18450->18451 18452 240f58f0 6 API calls 18451->18452 18453 240f7f27 18452->18453 18454 240f7d0c 6 API calls 18453->18454 18455 240f7f37 18454->18455 18456 240f7d0c 6 API calls 18455->18456 18457 240f7f47 18456->18457 18458 240f7d0c 6 API calls 18457->18458 18459 240f7f57 18458->18459 18460 240f7d0c 6 API calls 18459->18460 18461 240f7f67 18460->18461 18462 240f7d0c 6 API calls 18461->18462 18463 240f7f77 18462->18463 18464 240f7d0c 6 API calls 18463->18464 18465 240f7f87 18464->18465 18466 240f7d0c 6 API calls 18465->18466 18467 240f7f97 18466->18467 18468 240f7d0c 6 API calls 18467->18468 18469 240f7fa7 18468->18469 18470 240f7d0c 6 API calls 18469->18470 18471 240f7fb7 18470->18471 18472 240f7d0c 6 API calls 18471->18472 18473 240f7fc7 18472->18473 18474 240f7d0c 6 API calls 18473->18474 18475 240f7fd7 18474->18475 18476 240f7d0c 6 API calls 18475->18476 18477 240f7fe7 18476->18477 18478 240f58f0 6 API calls 18477->18478 18479 240f7ff7 18478->18479 18480 240f30dc 6 API calls 18479->18480 18481 240f800c 18480->18481 18482 240f7d0c 6 API calls 18481->18482 18483 240f8017 18482->18483 18484 240f7d0c 6 API calls 18483->18484 18485 240f8027 18484->18485 18486 240f7d0c 6 API calls 18485->18486 18487 240f8037 18486->18487 18488 240f30dc 6 API calls 18487->18488 18489 240f804c 18488->18489 18490 240f7d0c 6 API calls 18489->18490 18491 240f8057 18490->18491 18492 240f30dc 6 API calls 18491->18492 18493 240f806c 18492->18493 18494 240f30dc 6 API calls 18493->18494 18495 240f807c 18494->18495 18496 240f30dc 6 API calls 18495->18496 18497 240f808c 18496->18497 18498 240f30dc 6 API calls 18497->18498 18499 240f809c 18498->18499 18500 240f7d0c 6 API calls 18499->18500 18501 240f80a7 18500->18501 18502 240f30dc 6 API calls 18501->18502 18503 240f80bc 18502->18503 18504 240f30dc 6 API calls 18503->18504 18505 240f80cc 18504->18505 18506 240f30dc 6 API calls 18505->18506 18507 240f80dc 18506->18507 18508 240f7d0c 6 API calls 18507->18508 18509 240f80e7 18508->18509 18510 240f30dc 6 API calls 18509->18510 18511 240f80ff 18510->18511 18512 240f30dc 6 API calls 18511->18512 18513 240f810f 18512->18513 18513->16284 18513->16285 18514->16296 18515->16295 18517 240f758f 18516->18517 18754 240f1644 GetSystemTime 18517->18754 18519 240f75a2 18520 240f75e0 CreateFileA 18519->18520 18521 240f75ef CloseHandle CreateFileA 18520->18521 18522 240f762b SetFileTime 18520->18522 18523 240f7623 CloseHandle 18521->18523 18524 240f7611 SetFileTime 18521->18524 18525 240f763d CloseHandle 18522->18525 18523->18525 18524->18523 18526 240f7650 18525->18526 18527 240f3088 6 API calls 18526->18527 18528 240f7658 18527->18528 18528->16322 18530 240f767a 18529->18530 18531 240f76c6 CreateFileA 18530->18531 18532 240f76fd CloseHandle 18531->18532 18533 240f76d3 SetFileTime SetFileTime SetFileTime 18531->18533 18534 240f7710 18532->18534 18533->18532 18535 240f3088 6 API calls 18534->18535 18536 240f7718 18535->18536 18536->16303 18538 240f7739 18537->18538 18539 240f774f GetFileAttributesA SetFileAttributesA 18538->18539 18540 240f7776 18539->18540 18541 240f3088 6 API calls 18540->18541 18542 240f777e 18541->18542 18542->16325 18544 240f5bff 18543->18544 18545 240f5b5f 6 API calls 18543->18545 18546 240f67f8 18544->18546 18545->18544 18547 240f3120 6 API calls 18546->18547 18548 240f681b 18547->18548 18549 240f673c 10 API calls 18548->18549 18550 240f6825 18549->18550 18551 240f3088 6 API calls 18550->18551 18552 240f683a 18551->18552 18552->16323 18553->16330 18755 24132464 42 API calls 18553->18755 18756 241182ac 158 API calls 18553->18756 18757 241184fc 158 API calls 18553->18757 18758 2413251c 158 API calls 18553->18758 18759 241300ac 51 API calls 18553->18759 18555 24124450 18554->18555 18556 241244cb 18555->18556 18557 24124479 18555->18557 18560 240f3388 6 API calls 18556->18560 18558 240f3388 6 API calls 18557->18558 18559 24124492 18558->18559 18561 240f6858 9 API calls 18559->18561 18567 241244f4 18560->18567 18562 241244a4 18561->18562 18563 241244b7 18562->18563 18564 241244a8 18562->18564 18566 240f30dc 6 API calls 18563->18566 18565 240f30dc 6 API calls 18564->18565 18568 241244b2 18565->18568 18566->18568 18569 240f70b8 10 API calls 18567->18569 18570 240f30ac 6 API calls 18568->18570 18571 24124514 18569->18571 18572 241245be 18570->18572 18571->18568 18573 240f6bd0 7 API calls 18571->18573 18572->16336 18574 24124525 18573->18574 18575 240f6b28 7 API calls 18574->18575 18576 24124535 18575->18576 18577 240f6b08 GetLocalTime 18576->18577 18578 24124545 18577->18578 18579 240f6910 7 API calls 18578->18579 18580 24124555 18579->18580 18581 240f69b8 7 API calls 18580->18581 18582 24124565 18581->18582 18583 240f33fc 6 API calls 18582->18583 18584 24124575 18583->18584 18585 240f3388 6 API calls 18584->18585 18586 24124592 18585->18586 18587 240f6858 9 API calls 18586->18587 18587->18568 18588->16360 18760 24132464 42 API calls 18588->18760 18761 241182ac 158 API calls 18588->18761 18762 241184fc 158 API calls 18588->18762 18763 2413251c 158 API calls 18588->18763 18764 241300ac 51 API calls 18588->18764 18589->16364 18765 24132464 42 API calls 18589->18765 18766 241182ac 158 API calls 18589->18766 18767 241184fc 158 API calls 18589->18767 18768 2413251c 158 API calls 18589->18768 18769 241300ac 51 API calls 18589->18769 18590->16368 18591->16387 18593 24135248 18592->18593 18593->18593 18594 240f6ce4 12 API calls 18593->18594 18595 24135279 Sleep 18594->18595 18596 24135291 18595->18596 18596->18595 18597 240f3388 6 API calls 18596->18597 18611 241355ab RegOpenKeyExA 18596->18611 18612 241355d1 RegDeleteKeyA RegCloseKey 18596->18612 18613 240f70b8 10 API calls 18596->18613 18619 240f6858 9 API calls 18596->18619 18623 240f6858 9 API calls 18596->18623 18770 240f4f18 CreateMutexA 18596->18770 18790 240f66e4 LoadLibraryA GetProcAddress ShellExecuteA 18596->18790 18597->18596 18599 24135611 GetLastError 18600 24135637 CloseHandle 18599->18600 18601 2413561f CloseHandle CloseHandle 18599->18601 18603 240f6c78 8 API calls 18600->18603 18602 2413578d 18601->18602 18604 240f30ac 6 API calls 18602->18604 18626 24135644 18603->18626 18605 241357aa 18604->18605 18607 240f3088 6 API calls 18605->18607 18606 240f6634 11 API calls 18606->18626 18609 241357b2 18607->18609 18608 240f6438 15 API calls 18608->18626 18609->16307 18610 240f6588 6 API calls 18610->18626 18611->18596 18612->18596 18613->18596 18615 2413574b GetLastError 18616 24135764 CloseHandle 18615->18616 18617 24135759 CloseHandle 18615->18617 18616->18596 18617->18595 18619->18596 18620 240f6da0 10 API calls 18620->18626 18622 240f15e0 17 API calls 18622->18626 18623->18611 18624 240f757c 14 API calls 18624->18626 18625 240f7728 8 API calls 18625->18626 18626->18606 18626->18608 18626->18610 18626->18620 18626->18622 18626->18624 18626->18625 18627 240f7668 11 API calls 18626->18627 18771 240f7450 18626->18771 18789 240f4f18 CreateMutexA 18626->18789 18627->18626 18628->16341 18795 24132464 42 API calls 18628->18795 18796 241182ac 158 API calls 18628->18796 18797 241184fc 158 API calls 18628->18797 18798 2413251c 158 API calls 18628->18798 18799 241300ac 51 API calls 18628->18799 18629->16344 18800 24132464 42 API calls 18629->18800 18801 241182ac 158 API calls 18629->18801 18802 241184fc 158 API calls 18629->18802 18803 2413251c 158 API calls 18629->18803 18804 241300ac 51 API calls 18629->18804 18631 24133a12 GetCurrentProcessId 18630->18631 18632 24133a0d 18630->18632 18631->16363 18805 24133944 18632->18805 18635 240f6870 18634->18635 18636 240f689c RegCreateKeyA 18635->18636 18637 240f68ab 18636->18637 18638 240f68c1 RegSetValueExA 18637->18638 18639 240f68cf 18638->18639 18640 240f68d1 RegCloseKey 18638->18640 18639->18640 18641 240f68e7 18640->18641 18642 240f30ac 6 API calls 18641->18642 18643 240f68f4 18642->18643 18644 240f3088 6 API calls 18643->18644 18645 240f68fc 18644->18645 18646 240f4f18 CreateMutexA 18645->18646 18646->16376 18647->16353 18881 24132464 42 API calls 18647->18881 18882 241182ac 158 API calls 18647->18882 18883 241184fc 158 API calls 18647->18883 18884 2413251c 158 API calls 18647->18884 18885 241300ac 51 API calls 18647->18885 18649 240f2e4e 18648->18649 18650 240f2ec7 18649->18650 18651 240f2f9f FreeLibrary 18649->18651 18652 240f2fc4 18649->18652 18650->18387 18651->18649 18653 240f2fcd 18652->18653 18654 240f2fd3 ExitProcess 18652->18654 18653->18654 18656 240f3120 6 API calls 18655->18656 18661 240f7ad0 18656->18661 18658 240f3590 6 API calls 18658->18661 18659 240f7b31 18660 240f7b64 18659->18660 18662 240f44f4 9 API calls 18659->18662 18680 240f453c 18660->18680 18661->18658 18661->18659 18664 240f35d0 6 API calls 18661->18664 18684 240f44f4 18661->18684 18665 240f7b52 18662->18665 18664->18661 18666 240f30dc 6 API calls 18665->18666 18666->18660 18668 240f4500 6 API calls 18669 240f7b90 18668->18669 18670 240f3088 6 API calls 18669->18670 18671 240f7b98 18670->18671 18671->18395 18673 240f7a38 18672->18673 18674 240f7a73 18673->18674 18676 240f3588 6 API calls 18673->18676 18675 240f30dc 6 API calls 18674->18675 18677 240f7a7d 18675->18677 18676->18673 18678 240f3088 6 API calls 18677->18678 18679 240f7a92 18678->18679 18679->18395 18681 240f4543 18680->18681 18682 240f455b 18681->18682 18683 240f4500 6 API calls 18681->18683 18682->18668 18683->18682 18687 240f4368 18684->18687 18688 240f4387 18687->18688 18692 240f43a1 18687->18692 18689 240f4392 18688->18689 18704 240f141c 18688->18704 18710 240f4360 18689->18710 18693 240f43eb 18692->18693 18694 240f141c 6 API calls 18692->18694 18695 240f442d 18693->18695 18698 240f43f8 18693->18698 18694->18693 18697 240f1344 6 API calls 18695->18697 18696 240f1374 6 API calls 18700 240f4428 18696->18700 18699 240f4437 18697->18699 18698->18696 18699->18700 18713 240f4348 18699->18713 18701 240f439c 18700->18701 18703 240f4368 9 API calls 18700->18703 18701->18661 18703->18700 18705 240f13d0 18704->18705 18706 240f4d70 4 API calls 18705->18706 18708 240f13f5 18705->18708 18706->18708 18707 240f13c4 2 API calls 18709 240f1417 18707->18709 18708->18707 18709->18689 18711 240f4500 6 API calls 18710->18711 18712 240f4365 18711->18712 18712->18701 18716 240f3dc0 18713->18716 18715 240f4353 18715->18700 18717 240f3dfb 18716->18717 18718 240f3dd5 18716->18718 18719 240f30dc 6 API calls 18717->18719 18727 240f3e18 18717->18727 18720 240f3e1d 18718->18720 18721 240f3dda 18718->18721 18719->18717 18720->18727 18732 240f37b4 18720->18732 18723 240f3e45 18721->18723 18724 240f3de4 18721->18724 18721->18727 18723->18727 18728 240f3dc0 9 API calls 18723->18728 18725 240f3de9 18724->18725 18726 240f3e66 18724->18726 18725->18717 18725->18727 18730 240f3e97 18725->18730 18726->18727 18742 240f3ca4 18726->18742 18727->18715 18728->18723 18730->18727 18731 240f453c 6 API calls 18730->18731 18731->18730 18733 240f37bc 18732->18733 18734 240f3778 18732->18734 18733->18734 18735 240f37c7 SysReAllocStringLen 18733->18735 18736 240f377e SysFreeString 18734->18736 18737 240f378c 18734->18737 18738 240f3748 18735->18738 18739 240f37d7 18735->18739 18736->18737 18737->18720 18740 240f3764 18738->18740 18741 240f3754 SysAllocStringLen 18738->18741 18739->18720 18740->18720 18741->18738 18741->18740 18748 240f3cbe 18742->18748 18743 240f30dc 6 API calls 18743->18748 18744 240f37b4 3 API calls 18744->18748 18745 240f3daa 18745->18726 18746 240f3dc0 9 API calls 18746->18748 18747 240f3ca4 9 API calls 18747->18748 18748->18743 18748->18744 18748->18745 18748->18746 18748->18747 18749 240f453c 6 API calls 18748->18749 18749->18748 18751 240f7d1c 18750->18751 18752 240f3088 6 API calls 18751->18752 18753 240f7d52 18752->18753 18753->18412 18754->18519 18770->18599 18772 240f7465 18771->18772 18782 240f748b 18772->18782 18791 240f742c 18772->18791 18775 240f30ac 6 API calls 18776 240f755f 18775->18776 18776->18626 18777 240f3120 6 API calls 18778 240f749d 18777->18778 18779 240f3344 6 API calls 18778->18779 18787 240f74bc 18778->18787 18779->18787 18780 240f753b 18781 240f742c GetFileAttributesA 18780->18781 18781->18782 18782->18775 18783 240f3590 6 API calls 18783->18787 18784 240f3344 6 API calls 18784->18787 18785 240f35d0 6 API calls 18785->18787 18786 240f742c GetFileAttributesA 18786->18787 18787->18780 18787->18783 18787->18784 18787->18785 18787->18786 18788 240f751b CreateDirectoryA 18787->18788 18788->18782 18788->18787 18789->18615 18790->18596 18792 240f3534 18791->18792 18793 240f7436 GetFileAttributesA 18792->18793 18794 240f7441 18793->18794 18794->18777 18794->18782 18834 2413352c LoadLibraryA 18805->18834 18807 2413394b 18808 2413394f 18807->18808 18837 241336d0 GetVersionExA 18807->18837 18808->18631 18812 24133970 18813 24133898 4 API calls 18812->18813 18814 24133978 18813->18814 18815 24133983 18814->18815 18816 241339b4 18814->18816 18817 24133898 4 API calls 18815->18817 18819 24133898 4 API calls 18816->18819 18832 241339b0 CloseHandle 18816->18832 18820 2413398e 18817->18820 18823 241339c4 18819->18823 18821 24133898 4 API calls 18820->18821 18824 2413399b 18821->18824 18825 24133898 4 API calls 18823->18825 18849 241338ec 18824->18849 18827 241339d1 18825->18827 18829 241338ec 4 API calls 18827->18829 18828 241339a7 18830 241338ec 4 API calls 18828->18830 18831 241339dd 18829->18831 18830->18832 18833 241338ec 4 API calls 18831->18833 18854 241335a8 18832->18854 18833->18832 18835 24133547 GetProcAddress GetProcAddress 18834->18835 18836 24133544 18834->18836 18835->18807 18836->18807 18838 241336f1 18837->18838 18840 241336f8 18837->18840 18838->18808 18844 24133898 18838->18844 18839 241337a6 18839->18838 18841 241337ae MapViewOfFile 18839->18841 18840->18838 18840->18839 18857 241335c4 GetSecurityInfo 18840->18857 18841->18838 18874 24133810 18844->18874 18846 241338a7 MapViewOfFile 18847 241338c9 18846->18847 18848 241338cd UnmapViewOfFile 18846->18848 18847->18812 18848->18812 18850 24133810 2 API calls 18849->18850 18851 241338fe MapViewOfFile 18850->18851 18852 24133920 18851->18852 18853 24133925 UnmapViewOfFile 18851->18853 18852->18828 18853->18828 18855 241335b1 FreeLibrary 18854->18855 18856 241335bc 18854->18856 18855->18856 18856->18808 18858 241335ee 18857->18858 18861 24133610 18857->18861 18859 241335f4 LocalFree 18858->18859 18860 241335ff 18858->18860 18859->18860 18860->18861 18862 24133606 LocalFree 18860->18862 18863 2413361e SetEntriesInAclA 18861->18863 18862->18861 18864 2413365a 18863->18864 18865 2413367c SetSecurityInfo 18863->18865 18866 24133660 LocalFree 18864->18866 18867 2413366b 18864->18867 18868 241336b7 CloseHandle 18865->18868 18869 24133695 18865->18869 18866->18867 18867->18865 18870 24133672 LocalFree 18867->18870 18868->18839 18871 241336a6 18869->18871 18872 2413369b LocalFree 18869->18872 18870->18865 18871->18868 18873 241336ad LocalFree 18871->18873 18872->18871 18873->18868 18875 24133825 18874->18875 18876 2413382a 18874->18876 18875->18846 18877 24133847 MapViewOfFile 18876->18877 18878 24133835 18876->18878 18879 24133879 18877->18879 18880 2413387e UnmapViewOfFile 18877->18880 18878->18846 18879->18846 18880->18878 18887 24134c82 18886->18887 18888 24134c2a 18886->18888 18889 240f30ac 6 API calls 18887->18889 18890 240f15e0 17 API calls 18888->18890 18891 24134c9c 18889->18891 18893 24134c34 18890->18893 18892 240f6634 11 API calls 18892->18893 18893->18887 18893->18892 18894 240f6c78 8 API calls 18893->18894 18895 24134c53 Sleep 18893->18895 18894->18893 18895->18893 18905 24122418 18896->18905 18899 241351fc 18901 2413521d 18899->18901 18930 240f78c8 CreateThread SetThreadPriority 18899->18930 18903 240f3088 6 API calls 18901->18903 18904 24135232 18903->18904 18906 24122420 18905->18906 18907 240f3388 6 API calls 18906->18907 18908 24122461 18907->18908 18909 240f70b8 10 API calls 18908->18909 18910 24122481 18909->18910 18911 2412250d 18910->18911 18912 240f6bd0 7 API calls 18910->18912 18913 240f30ac 6 API calls 18911->18913 18914 24122492 18912->18914 18915 24122527 18913->18915 18916 240f6b28 7 API calls 18914->18916 18915->18899 18929 240f78c8 CreateThread SetThreadPriority 18915->18929 18917 241224a2 18916->18917 18918 240f6b08 GetLocalTime 18917->18918 18919 241224b2 18918->18919 18920 240f6910 7 API calls 18919->18920 18921 241224c2 18920->18921 18922 240f69b8 7 API calls 18921->18922 18923 241224d2 18922->18923 18924 240f33fc 6 API calls 18923->18924 18925 241224e2 18924->18925 18926 240f3388 6 API calls 18925->18926 18927 241224fb 18926->18927 18928 240f6858 9 API calls 18927->18928 18928->18911 18929->18899 18931 24132464 42 API calls 18929->18931 18932 241182ac 158 API calls 18929->18932 18933 241184fc 158 API calls 18929->18933 18934 2413251c 158 API calls 18929->18934 18935 241300ac 51 API calls 18929->18935 18930->18901 18936 24132464 42 API calls 18930->18936 18937 241182ac 158 API calls 18930->18937 18938 241184fc 158 API calls 18930->18938 18939 2413251c 158 API calls 18930->18939 18940 241300ac 51 API calls 18930->18940 18946 1e0000 18947 1e0020 Sleep 18946->18947 18947->18947 18948 240f2ed0 18949 240f2edc 18948->18949 18951 240f2ef0 18949->18951 18952 240f4b54 18949->18952 18953 240f4b64 18952->18953 18954 240f4b95 18952->18954 18953->18954 18958 240f45b4 18953->18958 18954->18949 18956 240f4b84 LoadStringA 18957 240f3174 6 API calls 18956->18957 18957->18954 18959 240f45be 18958->18959 18960 240f45db 18958->18960 18959->18960 18963 240f456c 18959->18963 18960->18956 18964 240f457c GetModuleFileNameA 18963->18964 18965 240f4598 18963->18965 18967 240f47a8 GetModuleFileNameA RegOpenKeyExA 18964->18967 18965->18956 18968 240f482b 18967->18968 18969 240f47eb RegOpenKeyExA 18967->18969 18985 240f45f0 GetModuleHandleA 18968->18985 18969->18968 18970 240f4809 RegOpenKeyExA 18969->18970 18970->18968 18972 240f48b4 lstrcpyn GetThreadLocale GetLocaleInfoA 18970->18972 18974 240f49ce 18972->18974 18975 240f48eb 18972->18975 18974->18965 18975->18974 18978 240f48fb lstrlen 18975->18978 18976 240f488e RegCloseKey 18976->18965 18977 240f4870 RegQueryValueExA 18977->18976 18980 240f4913 18978->18980 18980->18974 18981 240f4938 lstrcpyn LoadLibraryExA 18980->18981 18982 240f4960 18980->18982 18981->18982 18982->18974 18983 240f496a lstrcpyn LoadLibraryExA 18982->18983 18983->18974 18984 240f499c lstrcpyn LoadLibraryExA 18983->18984 18984->18974 18986 240f4658 18985->18986 18987 240f4618 GetProcAddress 18985->18987 18990 240f477a RegQueryValueExA 18986->18990 19000 240f468b 18986->19000 19002 240f45dc 18986->19002 18987->18986 18988 240f4629 18987->18988 18988->18986 18992 240f463f lstrcpyn 18988->18992 18989 240f469e lstrcpyn 18996 240f46bc 18989->18996 18990->18976 18990->18977 18992->18990 18993 240f4766 lstrcpyn 18993->18990 18995 240f45dc CharNextA 18995->18996 18996->18990 18996->18993 18996->18995 18998 240f46db lstrcpyn FindFirstFileA 18996->18998 18997 240f45dc CharNextA 18997->19000 18998->18990 18999 240f4706 FindClose lstrlen 18998->18999 18999->18990 19001 240f4725 lstrcpyn lstrlen 18999->19001 19000->18989 19000->18990 19001->18996 19003 240f45e4 19002->19003 19004 240f45ef 19003->19004 19005 240f45de CharNextA 19003->19005 19004->18990 19004->18997 19005->19003

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 0 24136188-2413618b 1 24136190-24136195 0->1 1->1 2 24136197-24136294 call 240f4dbc call 240f7038 call 240f3388 call 240f6ce4 call 240f30dc call 240f3674 call 240f3590 call 240f3674 call 240f35d0 call 240f3674 call 240f3590 call 240f3674 call 240f35d0 call 240f7be0 call 240f7da8 1->2 33 24136296-241362cf RegOpenKeyExA call 240f3534 RegDeleteKeyA RegCloseKey 2->33 34 241362d4-241362dc 2->34 33->34 36 24136332-2413636a call 240f3534 DeleteFileA call 240f3534 call 240f4f18 GetLastError 34->36 37 241362de-24136300 call 240f3388 call 240f3534 call 240f4f18 34->37 51 24136373-241363a9 CreateThread * 2 36->51 52 2413636c-2413636e ExitProcess 36->52 50 24136305-24136317 GetLastError 37->50 53 24136319-24136326 CloseHandle 50->53 54 24136328-2413632d call 24135240 50->54 56 241363ab-241363bf call 240f15e0 call 240f3480 51->56 57 241363da-241363e2 51->57 53->36 62 2413672b-24136745 call 240f30ac 54->62 56->57 74 241363c1-241363d5 call 240f757c call 240f6588 call 240f7668 56->74 59 24136413-2413644e GetCurrentProcessId call 240f5c1c call 240f5b30 call 240f67f8 call 240f33fc 57->59 60 241363e4-241363f8 call 240f15e0 call 240f3480 57->60 91 24136454-24136490 call 2410444c call 240f30dc call 240f3344 call 240f6c78 59->91 92 241365ab-241365d3 call 24124448 call 240f30dc 59->92 60->59 79 241363fa-2413640e call 240f7728 call 240f6588 call 240f7728 60->79 74->57 79->59 115 24136492-241364ab call 240f333c call 240f6da0 91->115 116 241364b0-241364d1 call 240f6ce4 call 240f30dc 91->116 103 241365e3-241365eb 92->103 104 241365d5-241365de call 240f78c8 92->104 107 241365fb-2413663b call 240f67f8 call 240f33fc 103->107 108 241365ed-241365f6 call 240f78c8 103->108 104->103 120 2413668f-241366c4 call 240f78c8 * 2 call 240f4f18 call 240f6c78 107->120 121 2413663d-2413668a call 24133a04 GetCurrentProcessId call 240f58bc call 240f6858 call 240f4f18 call 240f78c8 107->121 108->107 115->116 133 24136551-24136558 116->133 156 241366c6-241366e4 call 240f3534 call 240f66e4 120->156 157 241366fd-24136705 120->157 121->120 136 241364d3-2413654c call 240f3674 call 240f3590 call 2410444c call 240f3344 call 240f3674 call 240f35d0 * 2 133->136 137 2413655e-2413659e call 240f3534 SetFileAttributesA call 240f7668 call 240f3534 SetFileAttributesA call 240f78c8 133->137 136->133 168 241365a3-241365a9 137->168 156->157 174 241366e6-241366f6 Sleep CloseHandle 156->174 159 24136707-24136726 CloseHandle * 2 Sleep 157->159 160 241366f8 call 24118298 157->160 159->62 160->157 168->92 174->157
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,241437BC,2413B980,2413B97C,00000000,24136746,?,?,?,00000000,00000000), ref: 241362AC
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 241362C4
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,241437BC,2413B980,2413B97C,00000000,24136746,?,?,?,00000000), ref: 241362CF
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,2413B980,2413B97C,00000000,24136746,?,?,?,00000000,00000000), ref: 2413630D
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000003BC,00000000,00000000,00000000,2413B980,2413B97C,00000000,24136746,?,?,?,00000000,00000000), ref: 24136321
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,2413B980,2413B97C,00000000,24136746,?,?,?,00000000,00000000), ref: 2413633D
                                                                                                                                                                                                                      • Part of subcall function 240F4F18: CreateMutexA.KERNEL32(?,?,?,?,24118D32,00000000,00000000,00000000,00000000,?,00001388,?,24118DFC,?,24118DFC,?), ref: 240F4F2E
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00000000,2413B980,2413B97C,00000000,24136746,?,?,?,00000000,00000000), ref: 24136360
                                                                                                                                                                                                                    • ExitProcess.KERNEL32(00000000,00000000,00000000,00000000,00000000,2413B980,2413B97C,00000000,24136746,?,?,?,00000000,00000000), ref: 2413636E
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00044C04,00000000,00000000,241437B8), ref: 24136385
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000451BC,00000000,00000000,241437B8), ref: 2413639C
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(00000000,00000000,Function_000451BC,00000000,00000000,241437B8,00000000,00000000,Function_00044C04,00000000,00000000,241437B8,00000000,00000000,00000000,00000000), ref: 24136413
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC,00000000,00000000,241437B8,00000000,00000000,Function_00044C04,00000000), ref: 24136570
                                                                                                                                                                                                                      • Part of subcall function 240F7668: CreateFileA.KERNEL32(00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76C7
                                                                                                                                                                                                                      • Part of subcall function 240F7668: SetFileTime.KERNEL32(00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76DC
                                                                                                                                                                                                                      • Part of subcall function 240F7668: SetFileTime.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000), ref: 240F76EA
                                                                                                                                                                                                                      • Part of subcall function 240F7668: SetFileTime.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000), ref: 240F76F8
                                                                                                                                                                                                                      • Part of subcall function 240F7668: CloseHandle.KERNEL32(00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76FE
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(SQLite3.dll,241367CC,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC,00000000,00000000,241437B8,00000000,00000000,Function_00044C04,00000000), ref: 24136642
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000002,00000000,00000080,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC,00000000,00000000,241437B8,00000000,00000000), ref: 24136590
                                                                                                                                                                                                                      • Part of subcall function 240F78C8: CreateThread.KERNEL32(00000000,00000000,24124A34,00000000,00000000), ref: 240F78D6
                                                                                                                                                                                                                      • Part of subcall function 240F78C8: SetThreadPriority.KERNEL32(00000000,00000000,00000000,?,?,24118CF6,24118E4C,24118E40,2413B8DC,0000000A,00000064,?,00001388,?,24118DFC,?), ref: 240F78DF
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,00000001,00000000,00000000,00000000,00000000,_x_X_PASSWORDLIST_X_x_,SQLite3.dll,241367CC,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC), ref: 241366EB
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,000003E8,00000001,00000000,00000000,00000000,00000000,_x_X_PASSWORDLIST_X_x_,SQLite3.dll,241367CC,?,logs.dat,241367CC,?,00000000,00000000), ref: 241366F1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000003BC,00000000,00000000,_x_X_PASSWORDLIST_X_x_,SQLite3.dll,241367CC,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC,00000000,00000000,241437B8), ref: 2413670F
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,000003BC,00000000,00000000,_x_X_PASSWORDLIST_X_x_,SQLite3.dll,241367CC,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC,00000000,00000000), ref: 2413671C
                                                                                                                                                                                                                    • Sleep.KERNEL32(00002EE0,00000000,000003BC,00000000,00000000,_x_X_PASSWORDLIST_X_x_,SQLite3.dll,241367CC,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC,00000000), ref: 24136726
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Close$CreateHandle$Thread$ProcessTime$AttributesCurrentDeleteErrorLastSleep$ExitMutexOpenPriority
                                                                                                                                                                                                                    • String ID: ####$PIDprocess$SOFTWARE\Microsoft\$SPY_NET_RATMUTEX$SQLite3.dll$Software\Microsoft\Active Setup\Installed Components\$XX--XX--XX.txt$[LogFile]$_PERSIST$_x_X_PASSWORDLIST_X_x_$logs.dat$njkvenknvjebcddlaknvfdvjkfdskv$open
                                                                                                                                                                                                                    • API String ID: 2216801884-1096289745
                                                                                                                                                                                                                    • Opcode ID: b9db85d793d2e714cb889c9869c8a7581e65bf8d2b3649365f2cacd3f2a07e8b
                                                                                                                                                                                                                    • Instruction ID: c0784e3e509f459fe518fdfbfe76ac423c1293f81d421c2ecbb3126ac2c74c50
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b9db85d793d2e714cb889c9869c8a7581e65bf8d2b3649365f2cacd3f2a07e8b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F4E16A707042049BE715EBA9CCC0B4D7BE6EBA5A48F524470F544BB398CEB8EE858B51

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 240F47C4
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240F47E2
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240F4800
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 240F481E
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,240F48AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 240F4867
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,240F4A14,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,240F48AD,?,80000001), ref: 240F4885
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,240F48B4,00000000,00000000,00000005,00000000,240F48AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240F48A7
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 240F48C4
                                                                                                                                                                                                                    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 240F48D1
                                                                                                                                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 240F48D7
                                                                                                                                                                                                                    • lstrlen.KERNEL32(00000000), ref: 240F4902
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 240F4949
                                                                                                                                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 240F4959
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 240F4981
                                                                                                                                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 240F4991
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 240F49B7
                                                                                                                                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 240F49C7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                                                                                                                                    • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                                                                                                                    • API String ID: 1759228003-3917250287
                                                                                                                                                                                                                    • Opcode ID: f0d95c9899d3809427cc99b5fc07e0407ecbb365a177b5810f1df30185dacb1c
                                                                                                                                                                                                                    • Instruction ID: c67c050267413d564b7aaacf99b1cd5250204466ba31dd0fe85d7c877ffc0f42
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f0d95c9899d3809427cc99b5fc07e0407ecbb365a177b5810f1df30185dacb1c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0B517275A0425D7AFB12C6E48C85FEF7BECAB14744F4201B1AB04E6185EE749FD48BA0

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExA.KERNEL32(00000094), ref: 240F5B4D
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000020,?,00000000,240F5BF5,?,00000094), ref: 240F5B73
                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000020,?,00000000,240F5BF5,?,00000094), ref: 240F5B79
                                                                                                                                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 240F5B8C
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,?,00000000,00000020,?,00000000,240F5BF5,?,00000094), ref: 240F5BB6
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,?,?,00000000,00000001,00000000,00000000,?,00000000,00000020,?,00000000), ref: 240F5BDD
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,00000001,00000000,00000000,?,?,00000000,00000001,00000000,00000000,?,00000000,00000020,?), ref: 240F5BE6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Token$AdjustPrivilegesProcess$CloseCurrentHandleLookupOpenPrivilegeValueVersion
                                                                                                                                                                                                                    • String ID: SeDebugPrivilege
                                                                                                                                                                                                                    • API String ID: 3222167619-2896544425
                                                                                                                                                                                                                    • Opcode ID: 7b58dac96864cd444394ee72853ab272b974618b9e7a0277b18eff88761772da
                                                                                                                                                                                                                    • Instruction ID: fa8dca543fc19d8f53f656879f894f2bf4d7d6baf8d57cecacd2c66c0fff779f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b58dac96864cd444394ee72853ab272b974618b9e7a0277b18eff88761772da
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D22130B1A10208BEFB10CBE5DD45FEFBBFCEB14704F1244B5EA04E6181DA755A848BA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,00000000,?,2413B980,?,2413641D,00000000,00000000,Function_000451BC,00000000,00000000,241437B8,00000000,00000000,Function_00044C04), ref: 240F5C29
                                                                                                                                                                                                                    • NtQueryInformationProcess.NTDLL(00000000,00000016,?,00000004,00000000), ref: 240F5C40
                                                                                                                                                                                                                    • NtSetInformationProcess.NTDLL(00000000,00000016,?,00000004), ref: 240F5C5E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,001F0FFF,00000000,00000000,?,2413B980,?,2413641D,00000000,00000000,Function_000451BC,00000000,00000000,241437B8,00000000,00000000), ref: 240F5C6C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$Information$CloseHandleOpenQuery
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1636144130-0
                                                                                                                                                                                                                    • Opcode ID: 8b0411576a1d48e6dbe04b4ade3104a22fdf87d3cfc7ab914bc7621fac0affc4
                                                                                                                                                                                                                    • Instruction ID: 54cbae652a2b4ed1eed699a3ee30181d7857be5232bb49685b40fa20ead66683
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8b0411576a1d48e6dbe04b4ade3104a22fdf87d3cfc7ab914bc7621fac0affc4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 42F0E5723863143EF33159505C82FAF368CDF55BA8F030539FB40D60C2CA549AD942E6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CAD
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CB8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2295610775-0
                                                                                                                                                                                                                    • Opcode ID: c6b138c2800e3a2975a57462c0c379afc8971a2a0e60a38bf8654bc5f6f371c6
                                                                                                                                                                                                                    • Instruction ID: 13b09dbf706280a62356818e597d74e640b31d74985c563a068d0f9b37af591c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c6b138c2800e3a2975a57462c0c379afc8971a2a0e60a38bf8654bc5f6f371c6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 86F0E270500104AFD700EBF8CD9199EB7ECEB5862479309B1E814D26A4FE34AE449A50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CAD
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CB8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2295610775-0
                                                                                                                                                                                                                    • Opcode ID: bce4aeb50a31603514ecadccd17d9c04e2b5c8aab1da8a6b2fcba9643d846f84
                                                                                                                                                                                                                    • Instruction ID: 9b7455f6e1b04896c52cf8f2d3c27bc4b615f7f40e6bfc7e0678b2c4c8afb571
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bce4aeb50a31603514ecadccd17d9c04e2b5c8aab1da8a6b2fcba9643d846f84
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6BF02E70504104AFDB01DBF8CD51D9EB7FCEB5562479309B5E814D35A4EF385F459A10
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,240F8D23,00000000,240F8D66,?,?,00000000,00000000), ref: 240F8CE3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InfoLocale
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2299586839-0
                                                                                                                                                                                                                    • Opcode ID: c0a5c38b77294cd5bc0105dacaac811761fc0667ac39b8f869ab3184c1b78c3f
                                                                                                                                                                                                                    • Instruction ID: e2b2b30b613279014826f58682a81aadf59f618d2cd7d787be6e75cbcf1a3d1c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c0a5c38b77294cd5bc0105dacaac811761fc0667ac39b8f869ab3184c1b78c3f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 89D05E7731E2903AB210416A2D84DBB4ADCDBCA6B0F11417AFE48C6200E7108C4AA3BA

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 178 241184fc-241184ff 179 24118504-24118509 178->179 179->179 180 2411850b-24118577 call 240f7038 call 240f3388 call 240f6910 call 240f69b8 call 240f6a60 call 240f33fc call 240f6c78 179->180 195 24118579-24118589 call 240f333c call 240f6da0 180->195 196 2411858e-2411859c call 240f6c78 180->196 195->196 202 241185a6-241185ae 196->202 203 2411859e-241185a3 196->203 204 241185b4-241185c2 call 240f6c78 202->204 205 2411868b-24118693 202->205 203->202 204->205 212 241185c8-2411864f call 240f7038 GetTickCount call 240f58bc call 240f33fc call 240f3534 * 2 call 240f61a0 call 240f3534 * 2 CopyFileA 204->212 207 24118695-241186a3 call 240f6c78 205->207 208 241186ad-241186f7 call 240f6634 call 240f6910 call 240f69b8 call 240f6a60 call 240f33fc call 240f6c78 205->208 207->208 217 241186a5-241186aa 207->217 237 241186f9-24118709 call 240f333c call 240f6da0 208->237 238 2411870e-2411871f Sleep 208->238 260 24118651-24118660 call 240f6438 212->260 261 24118675-2411867d 212->261 217->208 237->238 239 24118725-24118736 238->239 240 24118864-241188c1 call 240f3120 call 240f3088 call 240f3674 call 240f3590 call 240f3674 call 240f35d0 call 240f58f0 238->240 243 24118738-2411873a 239->243 244 2411873f-2411875a call 240f3120 239->244 283 241188c4-241188c8 240->283 243->244 256 241187a9-241187b1 call 240f3088 244->256 257 2411875c-241187a4 call 240f3674 call 240f3590 call 240f3674 call 240f35d0 call 240f58f0 244->257 270 24118858-2411885c 256->270 257->270 273 24118662-24118667 260->273 274 2411866b 260->274 261->208 275 24118862 270->275 276 241187b6-241187ce Sleep 270->276 273->261 281 24118669 273->281 274->261 282 2411866d-24118672 274->282 275->283 279 241187d0-241187d2 276->279 280 241187d7-241187ed call 240f333c 276->280 279->280 299 24118850-24118853 call 240f3088 280->299 300 241187ef-2411884e call 240f3120 call 240f3674 call 240f3590 call 240f3674 call 240f35d0 call 240f58f0 280->300 281->282 282->261 287 24118943-2411894a 283->287 288 241188ca-241188df 283->288 290 24118950-2411897a Sleep GetTickCount call 24102908 287->290 291 24118cfe-24118d3e CloseHandle call 240f3388 call 240f3534 call 240f4f18 GetLastError 287->291 294 241188e1-241188e6 call 240f2688 288->294 295 241188eb-241188f2 288->295 308 2411897f-241189bd 290->308 330 24118d40-24118d46 CloseHandle 291->330 331 24118d59-24118d67 CloseHandle 291->331 294->295 303 241188f4-241188f6 295->303 304 241188fb-24118914 call 240f2658 295->304 299->270 300->270 303->304 304->287 308->291 319 241189c3-241189cc 308->319 319->291 323 241189d2-241189e1 Sleep 319->323 326 241189e3-241189eb 323->326 327 24118a1a-24118a45 call 240f33fc call 24118f28 323->327 326->327 333 241189ed-24118a15 call 24104720 call 240f30dc call 2410e9ec 326->333 352 24118c85-24118c8e 327->352 335 24118db2-24118dd4 call 240f30ac call 240f3088 330->335 337 24118d69-24118d88 call 24117cd4 Sleep call 24117cd4 331->337 338 24118d8a-24118d91 331->338 333->327 337->338 338->196 343 24118d97-24118da4 CloseHandle 338->343 343->335 359 24118c90-24118c97 352->359 360 24118c9d-24118cb0 call 24102638 352->360 359->360 363 24118a4a-24118a83 call 240f6da0 call 240f6634 call 24102b84 call 240f3088 call 241195f4 359->363 367 24118cb2-24118cb9 360->367 368 24118cbe-24118cc5 360->368 363->352 386 24118a89-24118ab7 call 240f3674 call 240f3590 call 240f3480 363->386 367->368 370 24118cc7-24118cc9 368->370 371 24118cce-24118cfc call 240f3120 call 240f30dc call 240f78c8 368->371 370->371 371->291 393 24118bb5-24118bc7 call 240f30dc call 24124a34 386->393 394 24118abd-24118aeb call 240f3674 call 240f3590 call 240f3480 386->394 393->352 394->393 405 24118af1-24118b1f call 240f3674 call 240f3590 call 240f3480 394->405 405->393 412 24118b25-24118b53 call 240f3674 call 240f3590 call 240f3480 405->412 412->393 419 24118b55-24118b83 call 240f3674 call 240f3590 call 240f3480 412->419 419->393 426 24118b85-24118bb3 call 240f3674 call 240f3590 call 240f3480 419->426 426->393 433 24118bcc-24118bfa call 240f3674 call 240f3590 call 240f3480 426->433 440 24118c3c-24118c40 433->440 441 24118bfc-24118c3a call 240f3674 call 240f35d0 call 240f3674 call 240f3590 433->441 440->352 442 24118c42-24118c51 call 240f3674 440->442 441->352 442->352 448 24118c53-24118c83 call 24102d34 call 240f30dc call 240f78c8 442->448 448->352
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 241185D3
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 24118642
                                                                                                                                                                                                                    • Sleep.KERNEL32(00001388,?,24118DFC,?,24118DFC,?,?,24118DFC,?,24118DFC,?,00000000,24118DD5), ref: 24118713
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CopyCountFileSleepTick
                                                                                                                                                                                                                    • String ID: .tmp$UuU.uUu$_SAIR$audiostop|$desligarmonitor$exit$hibernar$logoff$myrestart$myshutdown$njkvenknvjebcddlaknvfdvjkfdskv$poweroff$reconnect
                                                                                                                                                                                                                    • API String ID: 3875903300-1445509685
                                                                                                                                                                                                                    • Opcode ID: adaec0d96607975cb8a2dc77ba91571dc4f16762bf6372ce95fe9903e479254f
                                                                                                                                                                                                                    • Instruction ID: 348bd50761af4b316406bf508f3763b0de59ca608ee2c75115575bc94db54578
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: adaec0d96607975cb8a2dc77ba91571dc4f16762bf6372ce95fe9903e479254f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC321F31B001489FEB01DBA5C8C0A9EBBB5FB65358F518475E808B7398DF78EE858B51

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F1644: GetSystemTime.KERNEL32(?), ref: 240F164E
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F75E3
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F75F0
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000), ref: 240F7605
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000), ref: 240F761E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000), ref: 240F7624
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F7638
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F763E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseHandleTime$Create$System
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1407650207-0
                                                                                                                                                                                                                    • Opcode ID: aa6035fe38d09aeba5f810ca3b762b34164d23065ef788c33bacf485e5fb884c
                                                                                                                                                                                                                    • Instruction ID: 1874301888d49ff7afa348be4a27249d9896e7b624f90dfd2fd985b58baae0e4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa6035fe38d09aeba5f810ca3b762b34164d23065ef788c33bacf485e5fb884c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B821C3B1900208BAF751E7B4DC81F9E73ACEB28618F520171B610E61C5DF74AF848654

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 507 240f66e4-240f671a LoadLibraryA GetProcAddress ShellExecuteA
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(shell32.dll,ShellExecuteA,?,?,?,?,2412546A,00000000,00000000,2412E32C,2412E184,?,2412E184,?,?,2412E2A0), ref: 240F66FA
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 240F6700
                                                                                                                                                                                                                    • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,?,?,00000000,shell32.dll,ShellExecuteA,?,?,?,?,2412546A,00000000,00000000), ref: 240F6714
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressExecuteLibraryLoadProcShell
                                                                                                                                                                                                                    • String ID: ShellExecuteA$open$shell32.dll
                                                                                                                                                                                                                    • API String ID: 3429701994-209507969
                                                                                                                                                                                                                    • Opcode ID: b9d4beea239d046d32b607512332954fa7bbddc8199f017517b3c8233110c62a
                                                                                                                                                                                                                    • Instruction ID: 5dfc984d683ee46d6d2672d683d1384c3b2bf4ee05fec3974b37980483ccf861
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b9d4beea239d046d32b607512332954fa7bbddc8199f017517b3c8233110c62a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 87E086722006043B5310D9DBDC80D9FBB6CDED9A60312C539B908C3205D830AD4146F0

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F1644: GetSystemTime.KERNEL32(?), ref: 240F164E
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F75E3
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F75F0
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000), ref: 240F7605
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000), ref: 240F761E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000003,00000000,00000003,00000004,00000000,00000000,00000000,40000000,00000003,00000000,00000003,00000080,00000000), ref: 240F7624
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F7638
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,40000000,00000003,00000000,00000003,00000080,00000000,00000000,240F7659), ref: 240F763E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseHandleTime$Create$System
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1407650207-0
                                                                                                                                                                                                                    • Opcode ID: b7971229e404f2dc03aece7db86cc0f9db0addba67c1a86e91455a6819bc35e0
                                                                                                                                                                                                                    • Instruction ID: 44c08107a515ddd9fb9db7d911a5224c118d2f6c9194351fadf7de669eb2556b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b7971229e404f2dc03aece7db86cc0f9db0addba67c1a86e91455a6819bc35e0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7E1103B0A002047EF752A778DC92F8E77ACEB24228F520271F610FA1C5DE746F808A15

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00002710,?,241184EC,?,241184EC,?,00000000,241184A4,?,?,?,?,00000000,00000000), ref: 2411837F
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 241183F3
                                                                                                                                                                                                                    • Sleep.KERNEL32(00002710,00000000,2411847A,?,?,241184EC,?,241184EC,?,00002710,?,241184EC,?,241184EC,?,00000000), ref: 24118468
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep$CountTick
                                                                                                                                                                                                                    • String ID: XXXXXXXXXXXXXXXXXXXX$XxX.xXx
                                                                                                                                                                                                                    • API String ID: 207069750-1553977181
                                                                                                                                                                                                                    • Opcode ID: caaa3513e1bca4ec8783d69248d0b399acdefd07900474e52629cb1f7e4c8fe0
                                                                                                                                                                                                                    • Instruction ID: 5e9b0d1f9f23b50a050b80c9e838f676e919f00088429927cb7979cb4c64dd73
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: caaa3513e1bca4ec8783d69248d0b399acdefd07900474e52629cb1f7e4c8fe0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A2417F31A04108ABEB01DBA4CCD0A9DBBB9FF54708F52C475E404B7658DE38EB928B15

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00000001,?,00000000,240F7197,?,?,Desktop), ref: 240F710D
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,24102AE0,80000001,00000000,00000000,00000001,?,00000000,240F7197,?,?,Desktop), ref: 240F7131
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,24102AE0,?,00000000,00000000,?,00000000,24102AE0,80000001,00000000,00000000,00000001), ref: 240F715B
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,24102AE0,80000001,00000000,00000000,00000001,?,00000000,240F7197,?,?), ref: 240F716F
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: QueryValue$CloseOpen
                                                                                                                                                                                                                    • String ID: Desktop
                                                                                                                                                                                                                    • API String ID: 1586453840-3336322104
                                                                                                                                                                                                                    • Opcode ID: f14a8c14b77014f4164b02b088e9921b8f9c7882159e3c644ecdd7c10231eb2e
                                                                                                                                                                                                                    • Instruction ID: c6ceb8018b088cd9f979f16cde6e6bbd7f36acc7b0b10ec4655c6f2fc48c2156
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f14a8c14b77014f4164b02b088e9921b8f9c7882159e3c644ecdd7c10231eb2e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 63211B71A00608BBEB00EBA8DD90EAEB3FCEF58614F524075B904E7244DB74EE458B61

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76C7
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76DC
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000), ref: 240F76EA
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000), ref: 240F76F8
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76FE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Time$CloseCreateHandle
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 670991709-0
                                                                                                                                                                                                                    • Opcode ID: 6c4a5ec5f6482b3f1940648d70aa9e4521ca5ac3240df8c6f995e202b42cf2bd
                                                                                                                                                                                                                    • Instruction ID: 9f80f808b78f213e306d3cc1cf7fd2ffad025741ff5692b9a1646074ec7998f8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6c4a5ec5f6482b3f1940648d70aa9e4521ca5ac3240df8c6f995e202b42cf2bd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F81182B4A50304BEF720D774DC92F9E73ACEB54718F620471B610EA1C5EEB4BE808A64

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76C7
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76DC
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000), ref: 240F76EA
                                                                                                                                                                                                                    • SetFileTime.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,40000000,00000001,00000000), ref: 240F76F8
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000001,00000000,00000003,02000000,00000000,00000000,240F7719), ref: 240F76FE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Time$CloseCreateHandle
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 670991709-0
                                                                                                                                                                                                                    • Opcode ID: ee83c2f54622b7d1f15c9046fa1deeab20c7da7d1850151ee3acc5687d271019
                                                                                                                                                                                                                    • Instruction ID: 9300f45f5411deccfdf1ffcf0570bf8eafe27e6de770cc7733545faef7750b33
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ee83c2f54622b7d1f15c9046fa1deeab20c7da7d1850151ee3acc5687d271019
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 921182B4A50304BAF720D774DC92F9E73ACEB54718F620471B610EA1C5DEB4BA808A64

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindFirstFileA.KERNEL32(00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CAD
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindClose.KERNEL32(00000000,00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CB8
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,240F6D92,?,?,?,00000000), ref: 240F6D37
                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,240F6D92,?,?,?,00000000), ref: 240F6D41
                                                                                                                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,240F6D92), ref: 240F6D5C
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 240F6D77
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseFind$CreateFirstHandleReadSize
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2300874643-0
                                                                                                                                                                                                                    • Opcode ID: 55ee7388bad3973bde94372826e6ea89319b9c878f74cedd7d334d79db04e7c7
                                                                                                                                                                                                                    • Instruction ID: de282aae041860f821ff11b103cc517022a76a9d13abb6453595114f1e63f5a7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 55ee7388bad3973bde94372826e6ea89319b9c878f74cedd7d334d79db04e7c7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A3116030A00604BFEB11DB68CC91F6E7BB8EF56B14F5200B4F504EB298DE746E458655

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,240F6E3A,?,2414330C,00000000), ref: 240F6DE6
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,240F6E3A,?,2414330C,00000000), ref: 240F6DFE
                                                                                                                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,240F6E3A,?,2414330C), ref: 240F6E14
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,240F6E3A), ref: 240F6E1A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseCreateHandlePointerWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3604237281-0
                                                                                                                                                                                                                    • Opcode ID: 73ea0aae0c622ed69b726239551f68aa26d2ee7f49ff4929bd3f3bf3353b775b
                                                                                                                                                                                                                    • Instruction ID: 480bee3d62098c8f471b4f537b5ccb85317a0863c151b6b55957732fb15fec10
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 73ea0aae0c622ed69b726239551f68aa26d2ee7f49ff4929bd3f3bf3353b775b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F211D6706003047AF720D7B4DC92F9EB6ECEB55B28F620571B510F61C5DEB4BE808554

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000003,00000000,00000000,00000000,24132231,?,2414330C,00000000), ref: 241321E2
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000,00000000,24132231,?,2414330C,00000000), ref: 241321F5
                                                                                                                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000), ref: 2413220B
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000), ref: 24132211
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseCreateHandlePointerWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3604237281-0
                                                                                                                                                                                                                    • Opcode ID: fb19bb9b0fe1167166fc9ea4cd781049096fd4f262828be9e48563ecbb9e8258
                                                                                                                                                                                                                    • Instruction ID: ad34e37d84c911e064ee1c28eb1b3cb3310ebf6a6a4c0bf3250136945f9e36cd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fb19bb9b0fe1167166fc9ea4cd781049096fd4f262828be9e48563ecbb9e8258
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 070175706403447AF720E764DC92F5EBBACEB55B28F620571B600FA1D5DEB4BE408514
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 2411826F
                                                                                                                                                                                                                    • TranslateMessage.USER32 ref: 24118281
                                                                                                                                                                                                                    • DispatchMessageA.USER32 ref: 24118287
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000014,?,?,241182A2), ref: 2411828E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message$DispatchPeekSleepTranslate
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3768732053-0
                                                                                                                                                                                                                    • Opcode ID: 5b8e39013756ac92f66ab1ed471163146afefbc0c30940ddccd909afdcd235f4
                                                                                                                                                                                                                    • Instruction ID: a25d7d1ae0bd2e51fffffb5fe576af83a39ac0c3953cf02f3c64ba65c34a8ba4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b8e39013756ac92f66ab1ed471163146afefbc0c30940ddccd909afdcd235f4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 22E0123139272039FB7117A40C81FDE66884F2364EF564175F3056B0C5CA95694091A9
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindFirstFileA.KERNEL32(00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CAD
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindClose.KERNEL32(00000000,00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CB8
                                                                                                                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,240F66B3,?,00000000,240F66D3,?,?,?,2413B97C), ref: 240F667F
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,240F66B3,?,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6695
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000000,240F66B3,?,00000000,240F66D3,?,?,?,2413B97C), ref: 240F669B
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$AttributesFind$CloseDeleteFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 996707796-0
                                                                                                                                                                                                                    • Opcode ID: c11861369b5d293e1fbf2e1e522722b30a87822455dce32a3541be7a806ada39
                                                                                                                                                                                                                    • Instruction ID: 287b2e9b035285bf43915597bd26be61f064b78333dd32d0229ba19c29e5d515
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c11861369b5d293e1fbf2e1e522722b30a87822455dce32a3541be7a806ada39
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 42116631614244AFE712CBB4DC21E9FB7ECEB6AA18F5308B0E800D2640DE795E51D961
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 240F689E
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000002,00000000,00000000,00000000,240F68FD,?,?,?), ref: 240F68C6
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,00000000,00000000,240F68FD,?,?,?), ref: 240F68D5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseCreateValue
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1818849710-0
                                                                                                                                                                                                                    • Opcode ID: 1b51a9af7da0486295bbc7fc232a820a4a0898d31d92eabd0dc41375bd6c1c7b
                                                                                                                                                                                                                    • Instruction ID: 5739dfc59308aad53b8e4292b232af5991cfa5c9b0869b9b03dbf9e5631f5ead
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1b51a9af7da0486295bbc7fc232a820a4a0898d31d92eabd0dc41375bd6c1c7b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EE11EC71900108BFEB00EBA8DD91E9EB7ECEF68658F424475B804E7254DE78EE818B50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000001,00000000,2413250D,?,?,?,?,00000000), ref: 24132486
                                                                                                                                                                                                                      • Part of subcall function 240F794C: GetForegroundWindow.USER32(00000000,240F79B9,?,24143304,2414330C,?,00000000,?,24132493,00000001,00000000,2413250D), ref: 240F796B
                                                                                                                                                                                                                      • Part of subcall function 240F794C: GetWindowTextLengthA.USER32(00000000), ref: 240F7977
                                                                                                                                                                                                                      • Part of subcall function 240F794C: GetWindowTextA.USER32(00000000,00000000,00000001), ref: 240F7994
                                                                                                                                                                                                                      • Part of subcall function 2413038C: GetAsyncKeyState.USER32(00000008), ref: 241303C9
                                                                                                                                                                                                                      • Part of subcall function 2413038C: GetKeyState.USER32(00000014), ref: 241303EC
                                                                                                                                                                                                                      • Part of subcall function 2413038C: GetKeyState.USER32(00000010), ref: 241303F9
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 241324A2
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 241324EE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: StateWindow$CountTextTick$AsyncForegroundLengthSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3649555911-0
                                                                                                                                                                                                                    • Opcode ID: f62fa9df4ffc2662f08773a5bd375efc1fd5080953ca387a00a0808b364622a9
                                                                                                                                                                                                                    • Instruction ID: e4e5c685a112245be635afc6e50107a82d07dd4161719a3b48bbeb1bac68e4bb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f62fa9df4ffc2662f08773a5bd375efc1fd5080953ca387a00a0808b364622a9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AB01F530304184BFF315EB51DDD0E8EBFA8DB95768F2244B1E4009B10ECEB2AF8186A1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetForegroundWindow.USER32(00000000,240F79B9,?,24143304,2414330C,?,00000000,?,24132493,00000001,00000000,2413250D), ref: 240F796B
                                                                                                                                                                                                                    • GetWindowTextLengthA.USER32(00000000), ref: 240F7977
                                                                                                                                                                                                                    • GetWindowTextA.USER32(00000000,00000000,00000001), ref: 240F7994
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Text$ForegroundLength
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1471897267-0
                                                                                                                                                                                                                    • Opcode ID: 24b25d6de3033be04fe15964b52cc2500b306bdca8db84370e252a94abd1d19a
                                                                                                                                                                                                                    • Instruction ID: cab68aa7ebc9ff31ed94fcdabbe1c3c73011f722bf2625fa8dd155bd8c79280b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 24b25d6de3033be04fe15964b52cc2500b306bdca8db84370e252a94abd1d19a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2BF0F6712046047BF311A6B9CC91D5EB7DDCF96514B930075A800D3608DEB8AF408561
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,240F777F), ref: 240F7752
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,240F777F), ref: 240F7764
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AttributesFile
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3188754299-0
                                                                                                                                                                                                                    • Opcode ID: c4021b276290dbbd67368b48fc35696a60ea4524dae9e0b3c98c2aa1dfd1306d
                                                                                                                                                                                                                    • Instruction ID: 0a76d734737e342f6ac59f66b7b83150ed9cd9506897caedbb88902d1c329143
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c4021b276290dbbd67368b48fc35696a60ea4524dae9e0b3c98c2aa1dfd1306d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 06F0A070510A48BFB711EBA4CC91CAFB7ECEB596983930071F800D3504DEB47E409961
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,24124A34,00000000,00000000), ref: 240F78D6
                                                                                                                                                                                                                    • SetThreadPriority.KERNEL32(00000000,00000000,00000000,?,?,24118CF6,24118E4C,24118E40,2413B8DC,0000000A,00000064,?,00001388,?,24118DFC,?), ref: 240F78DF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Thread$CreatePriority
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2610526550-0
                                                                                                                                                                                                                    • Opcode ID: 61bb2c7c535dddc69725e08d5f89bd8f97d57c9ece6b52f4b021e6be42d572b0
                                                                                                                                                                                                                    • Instruction ID: ee457a59380481d4eaa8330773a84125dd0db4a2dcd0845deb4195d5e9c078b2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 61bb2c7c535dddc69725e08d5f89bd8f97d57c9ece6b52f4b021e6be42d572b0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 67D0C9A138E3903FF72552A52C82FBB1E0CDB92769F1502B6BA189A1C6C4846C0852B5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,24124A34,00000000,00000000), ref: 240F78D6
                                                                                                                                                                                                                    • SetThreadPriority.KERNEL32(00000000,00000000,00000000,?,?,24118CF6,24118E4C,24118E40,2413B8DC,0000000A,00000064,?,00001388,?,24118DFC,?), ref: 240F78DF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Thread$CreatePriority
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2610526550-0
                                                                                                                                                                                                                    • Opcode ID: b90d59c1ece38c85e66cc4d89c17127a835bff16823114e983e9d7694cf179ae
                                                                                                                                                                                                                    • Instruction ID: 49f73861ca3d2c499fb8e9905947dfd86a8e70b7976fdfe00167d53865ba16ff
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b90d59c1ece38c85e66cc4d89c17127a835bff16823114e983e9d7694cf179ae
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 28D08CF234A2203EF23412A63C86FBB0D0CDBD17BDF210235BA1C9A1C5C8802C0401F4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • TerminateThread.KERNEL32(00000000,00000001,?,2413B9C4,24118452,00000000,2411847A,?,?,241184EC,?,241184EC,?,00002710,?,241184EC), ref: 240F78F3
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000001,?,2413B9C4,24118452,00000000,2411847A,?,?,241184EC,?,241184EC,?,00002710,?), ref: 240F78FF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseHandleTerminateThread
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2476175854-0
                                                                                                                                                                                                                    • Opcode ID: 5893ba647653e121ef019f223bc399437da0a54cee20f113e6114f75509b07f9
                                                                                                                                                                                                                    • Instruction ID: 4f6ec0a11a7f15314a6e78e0e8be704f1c1393a18fd2723f2129fe93f043bb89
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5893ba647653e121ef019f223bc399437da0a54cee20f113e6114f75509b07f9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 20C04C6225366429B62129681CD0DEE414DEB525AEF120676F940D5145C9864D8901E5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocalTime.KERNEL32(?,00000000,240F699E,?,00000000), ref: 240F6933
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LocalTime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 481472006-0
                                                                                                                                                                                                                    • Opcode ID: 7350b4a9c6820360dd30810cb89ae5069ccbf8b9594c40b0414f4f6db9c65760
                                                                                                                                                                                                                    • Instruction ID: c2bf0c514a4c099d295d3de418d9f90259ce2913d3aff019377138f131494422
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7350b4a9c6820360dd30810cb89ae5069ccbf8b9594c40b0414f4f6db9c65760
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC0144B1A042096BBB05DBA5CC519BFB6FDEFC9714B828439A404E2654ED349E818661
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocalTime.KERNEL32(?,00000000,240F6A46,?,00000000), ref: 240F69DB
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LocalTime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 481472006-0
                                                                                                                                                                                                                    • Opcode ID: a8f0912915f021d7454707f035700b6569a93340550fb12dbb5dd0483ee45bf1
                                                                                                                                                                                                                    • Instruction ID: e13dc0c66355cff34ecccb7f5c24ccd63cea5e1e1c178fc70e494fb7ea36adf7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a8f0912915f021d7454707f035700b6569a93340550fb12dbb5dd0483ee45bf1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F018471A001096FB700DBA5CC518BFB6FEEBC8704B42C436A401E6255ED389D818961
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocalTime.KERNEL32(?,00000000,240F6AEE), ref: 240F6A83
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LocalTime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 481472006-0
                                                                                                                                                                                                                    • Opcode ID: b88d4b4d9917857a8a4f0baa790616a87a5da9f63a61f4c0df14a6eeb56480c1
                                                                                                                                                                                                                    • Instruction ID: f66452d7d0d94bfdda57eb3f78a95e83e257f25b9eb5ef09018d3278e5a998dc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b88d4b4d9917857a8a4f0baa790616a87a5da9f63a61f4c0df14a6eeb56480c1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17018470A04109ABF700DBA5CC519BFB6FDEBD8704B538435A400E2244ED389E818661
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocalTime.KERNEL32(?,00000000,240F6A46,?,00000000), ref: 240F69DB
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LocalTime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 481472006-0
                                                                                                                                                                                                                    • Opcode ID: 1b96d224f17209b4cd6f5ba3788dc72a559d29b6a203a3338a0f859868f96cb9
                                                                                                                                                                                                                    • Instruction ID: adf85b9e96e0cf9f01df45a285c0d4b618369115874d8578113c3fbbdee3d317
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1b96d224f17209b4cd6f5ba3788dc72a559d29b6a203a3338a0f859868f96cb9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26017171A04109AFEB01DBA5CC518BFBBB9EBC8714B52C53AA401E2654DD389A928961
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocalTime.KERNEL32(?,00000000,240F6AEE), ref: 240F6A83
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LocalTime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 481472006-0
                                                                                                                                                                                                                    • Opcode ID: 1b1495920e1e69c72181523e2035efdf93cbdb3a7f0cea80c10f8088d31fc326
                                                                                                                                                                                                                    • Instruction ID: 058e9bd192f1db0425cee6a8d01071132b642983ffd4e609d67d7197c73e5c22
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1b1495920e1e69c72181523e2035efdf93cbdb3a7f0cea80c10f8088d31fc326
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0601D470904109AFEB00CBA1CC518BFF7FDEBD8714B53843AA400E2694DD388E82CA61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00000400), ref: 24120E03
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileInfo
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4041567068-0
                                                                                                                                                                                                                    • Opcode ID: e1c84737f4da22ff05407a57cf157ca5e7cc64f5f8c22bae5e2f563d64426716
                                                                                                                                                                                                                    • Instruction ID: 8ffcbc6a3047568523fc5794e30d738cf8f0c10aee27efebb55166cd4cbb5258
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e1c84737f4da22ff05407a57cf157ca5e7cc64f5f8c22bae5e2f563d64426716
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1CF0C8316046186FE751DB65CCD1EDB7F7DEB89750F8204B5E604E7148EA72AE808E60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleFileNameA.KERNEL32(240F0000,?,00000105), ref: 240F458A
                                                                                                                                                                                                                      • Part of subcall function 240F47A8: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 240F47C4
                                                                                                                                                                                                                      • Part of subcall function 240F47A8: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240F47E2
                                                                                                                                                                                                                      • Part of subcall function 240F47A8: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240F4800
                                                                                                                                                                                                                      • Part of subcall function 240F47A8: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 240F481E
                                                                                                                                                                                                                      • Part of subcall function 240F47A8: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,240F48AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 240F4867
                                                                                                                                                                                                                      • Part of subcall function 240F47A8: RegQueryValueExA.ADVAPI32(?,240F4A14,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,240F48AD,?,80000001), ref: 240F4885
                                                                                                                                                                                                                      • Part of subcall function 240F47A8: RegCloseKey.ADVAPI32(?,240F48B4,00000000,00000000,00000005,00000000,240F48AD,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 240F48A7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2796650324-0
                                                                                                                                                                                                                    • Opcode ID: 1507f16d1c8060c37e29c217a3c29be13e96fd5195aa6ed9a79a539f112e1d2e
                                                                                                                                                                                                                    • Instruction ID: 4be9edb664acf6251dd80e58098c5433b163c0e2f7fb417f7384a8a877ad2ee3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1507f16d1c8060c37e29c217a3c29be13e96fd5195aa6ed9a79a539f112e1d2e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 58E03971A002108FDB00DE5888C0A4A33D8BB58654F020661AC54CF24BD774DA908790
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlExitUserThread.NTDLL(00000000), ref: 005B0023
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2512112996.00000000005B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_5b0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitThreadUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3424019298-0
                                                                                                                                                                                                                    • Opcode ID: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction ID: 31f55fc70ad1d22fff56d4cf632896c20d063e432f342e22e3eed41fb45fc377
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 46ff59f967ff6d5f8062231f6615e391b4eae6b59b37df9d4a5e4cea238d21c4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE0B676D00118ABCB109AE9DC088DFBB7DEF45221B000662B915F2110DB715A109AA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateMutexA.KERNEL32(?,?,?,?,24118D32,00000000,00000000,00000000,00000000,?,00001388,?,24118DFC,?,24118DFC,?), ref: 240F4F2E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateMutex
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1964310414-0
                                                                                                                                                                                                                    • Opcode ID: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                                                                                                                                                                                                                    • Instruction ID: 823c1d0e01e50064b800e4428e3b95a243eb6a8903d88d4f2bdf10659dca6de7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5AC01273160248AF8B00EEA8DC05D9B33DCAB28609B008824B928CB104C539E5A49B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(00910000,00000000), ref: 240F1301
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                    • Opcode ID: db486fc141d3cf3eeb78556c17dd34dc273fda7b345a4b96d1047699cca5b23c
                                                                                                                                                                                                                    • Instruction ID: a53d50c721c396865b7d7c55680f7e59519ec1ada49774b322e25b7f76428027
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: db486fc141d3cf3eeb78556c17dd34dc273fda7b345a4b96d1047699cca5b23c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 27B002B6710500AF9641EBAD8C44E2636DDE79E2443859450B518E7246D63D9C404B21
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlReAllocateHeap.NTDLL(00910000,00000000), ref: 240F133D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                    • Opcode ID: caa7f148bb4efedb58e2c40c176e3d8e526e4d5cb18d2785b2178a1695496079
                                                                                                                                                                                                                    • Instruction ID: ddf5df0d8f213de95b346c22d7e3c0384b9ca9579892887194a9e531566620a4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: caa7f148bb4efedb58e2c40c176e3d8e526e4d5cb18d2785b2178a1695496079
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2FB092B22106009AD641D799CC41F0336DCE75A304F8080107018E7102C53DA8104B28
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(00910000,00000000), ref: 240F1301
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                    • Opcode ID: 2fcb5acfe162e096614889ebecab8206673770e6616922c5236b776d6b1478b1
                                                                                                                                                                                                                    • Instruction ID: 3b47db099ff7fca2c8e59ea9f4f841e02944556415ae8c62579ca1fe9770bf44
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2fcb5acfe162e096614889ebecab8206673770e6616922c5236b776d6b1478b1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0BB002B66105009A9541EB998C44E1636DDA79E2443859450B118E7246D63D98404B21
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2511631398.00000000001E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_1e0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3472027048-0
                                                                                                                                                                                                                    • Opcode ID: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction ID: e2f073345a7329657dc691c931dfc1a5492980e565283ffa8103e39a6f4478e4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aa8963ae1cd73f7bd24b0d0180e87021e78b3d589d0fcefb7e39085448f0c57e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 05E00274D04648EFCB04DF99C98889DBBB5AF89320B25C295E865A73A5D730AE419A80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00910000,00000000), ref: 240F131B
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FreeHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3298025750-0
                                                                                                                                                                                                                    • Opcode ID: 59a15fdbb3f15c5d6bc8345cfd75db5c4fd5f4616dbb4cb98fc44142d21b0fec
                                                                                                                                                                                                                    • Instruction ID: 0bb76c5f3ea61e296de792922a5d35944b46e5cc7d5c9e5d99a0432ea5d548a3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 59a15fdbb3f15c5d6bc8345cfd75db5c4fd5f4616dbb4cb98fc44142d21b0fec
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AAC04CB33606015B9B1197EECCC2E1776DCF75E2097549511F518EB112D53EDC905A20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F78C8: CreateThread.KERNEL32(00000000,00000000,24124A34,00000000,00000000), ref: 240F78D6
                                                                                                                                                                                                                      • Part of subcall function 240F78C8: SetThreadPriority.KERNEL32(00000000,00000000,00000000,?,?,24118CF6,24118E4C,24118E40,2413B8DC,0000000A,00000064,?,00001388,?,24118DFC,?), ref: 240F78DF
                                                                                                                                                                                                                    • Sleep.KERNEL32(2413B930), ref: 24132540
                                                                                                                                                                                                                      • Part of subcall function 241300AC: GetTickCount.KERNEL32 ref: 24130124
                                                                                                                                                                                                                      • Part of subcall function 241300AC: CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 24130162
                                                                                                                                                                                                                      • Part of subcall function 241300AC: SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,.txt,?,00000000,00000000,?,00000000,241302D7,?,?,00000000,00000000), ref: 2413016D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileThread$AttributesCopyCountCreatePrioritySleepTick
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 696888678-0
                                                                                                                                                                                                                    • Opcode ID: 9b8ae2338a7cda8eedfc3f50b5589dd26a6ba8dd79c3d06478909124bb376d6f
                                                                                                                                                                                                                    • Instruction ID: 8b51a56ded81ec4ed46485657a654098df351e75d5105952bc48e823f70f54b4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9b8ae2338a7cda8eedfc3f50b5589dd26a6ba8dd79c3d06478909124bb376d6f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 46D01231B0424097B61CE778DCD080D3E85BFA614C74788696401BF09CCD78FB814726
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2516265880.0000000003CC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 03CC0000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_3cc0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: a8f87fc558e2f538fd351bdfc49e2c6aa18e45c6a6d2c8ec1415aa36aaa266a9
                                                                                                                                                                                                                    • Instruction ID: 18b5e61e04c7bcae5a7a9f8a09946595db22e2a0f492063f86ebefdf2a899b08
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a8f87fc558e2f538fd351bdfc49e2c6aa18e45c6a6d2c8ec1415aa36aaa266a9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 33D01275914208EFDB04CF54D84589EBBF5EB44320F20C165E914973A0E731AE509A44
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 240F460D
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 240F461E
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,?), ref: 240F464E
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,?,kernel32.dll), ref: 240F46B2
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll), ref: 240F46E7
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 240F46FA
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 240F4707
                                                                                                                                                                                                                    • lstrlen.KERNEL32(?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 240F4713
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 240F4747
                                                                                                                                                                                                                    • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 240F4753
                                                                                                                                                                                                                    • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 240F4775
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                                                                                                                                                                    • String ID: GetLongPathNameA$\$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 3245196872-1565342463
                                                                                                                                                                                                                    • Opcode ID: 2691ca1e4040681da7de2d89c7b7b236e77c8747fd0c532d466ef22df42ae37d
                                                                                                                                                                                                                    • Instruction ID: 5d46ac8944c3ce74a7da0b2e6eec258ee11acae5ecbcb827f627c7d83878ea90
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2691ca1e4040681da7de2d89c7b7b236e77c8747fd0c532d466ef22df42ae37d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61419C72900658AFEB51DAF8CC84FDEB7ECAF25214F0600B2A948E7104DF309ED48B50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 24134A0D
                                                                                                                                                                                                                    • GetThreadContext.KERNEL32(?,00010002), ref: 24134A41
                                                                                                                                                                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?,?,00010002), ref: 24134A66
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000004,?,?,?,00000004,?,?,00010002), ref: 24134AB5
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,00000000,?,?,?,?,?,00003000,00000004,?,?,?,00000004,?,?), ref: 24134ADE
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,?,?,?,00003000,00000004,?), ref: 24134B27
                                                                                                                                                                                                                    • VirtualProtectEx.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,?), ref: 24134B4F
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,?,00000000,00000004,?,?,00000000,00000000,?,?,?,?,?,00003000,00000004,?), ref: 24134B72
                                                                                                                                                                                                                    • SetThreadContext.KERNEL32(?,00010002,?,?,00000000,00000004,?,?,00000000,00000000,?,?,?,?,?,00003000), ref: 24134B95
                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(?,00000000,24134BD7), ref: 24134BBC
                                                                                                                                                                                                                    • ResumeThread.KERNEL32(?,24134BD7), ref: 24134BC7
                                                                                                                                                                                                                      • Part of subcall function 2413493C: LoadLibraryA.KERNEL32(ntdll.dll,ZwUnmapViewOfSection,?,00000000,24134A7E,?,?,?,00000004,?,?,00010002), ref: 2413494C
                                                                                                                                                                                                                      • Part of subcall function 2413493C: GetProcAddress.KERNEL32(00000000,ntdll.dll), ref: 24134952
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$Memory$ThreadWrite$ContextVirtual$AddressAllocCreateLibraryLoadProcProtectReadResumeTerminate
                                                                                                                                                                                                                    • String ID: D
                                                                                                                                                                                                                    • API String ID: 4089571990-2746444292
                                                                                                                                                                                                                    • Opcode ID: 338db447ca8bd9bce197389899b484d4e9ec1f8a2a8513815abdf10abf862362
                                                                                                                                                                                                                    • Instruction ID: 8b64923ba1a19e7ffb7e1291c2de0c7915bc87762f8be36215f7dae0e3a628c9
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 338db447ca8bd9bce197389899b484d4e9ec1f8a2a8513815abdf10abf862362
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2781C7B1A00209AFEB51DBE8DC81FEEBBF8AF58304F1144A5F604E7255D774EA448B64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,24120C93,?,00000000,24120D1E), ref: 24120B62
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,?,00000000,24120C93,?,00000000,24120D1E), ref: 24120C6F
                                                                                                                                                                                                                    • FindClose.KERNEL32(000000FF,24120C9A,24120C93,?,00000000,24120D1E), ref: 24120C8D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                    • String ID: %DESKTOP%$%RECENT%$%SYS%$%WIN%$*.*$Desktop$Recent
                                                                                                                                                                                                                    • API String ID: 3541575487-3092682246
                                                                                                                                                                                                                    • Opcode ID: 3b874ca6de88f01ef1f90662cee5c028f6597501964798851508670073e482bc
                                                                                                                                                                                                                    • Instruction ID: b13421e1c651a729f42dbbdc2982019bd47d8475f6f59c7c937d489feb9dd2bd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3b874ca6de88f01ef1f90662cee5c028f6597501964798851508670073e482bc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D9815930A00A2D9FDB11DB94CC80ADEBBB9AF45318F5141E9D508E7248DB74AF858F51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000008), ref: 241303C9
                                                                                                                                                                                                                    • GetKeyState.USER32(00000014), ref: 241303EC
                                                                                                                                                                                                                    • GetKeyState.USER32(00000010), ref: 241303F9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: State$Async
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 993286747-0
                                                                                                                                                                                                                    • Opcode ID: 56ea7edbb8224b653674744ad167b2c83213fffa18f639db4eec15ba92e3ec76
                                                                                                                                                                                                                    • Instruction ID: cf2234c9268d6d80ab92be89397bde116319e340a141ce3f0bde973acd4df602
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 56ea7edbb8224b653674744ad167b2c83213fffa18f639db4eec15ba92e3ec76
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DBB160347042458BF312E768CCC4BD9BBE2AF99718F9248B0D4449B25DDEB9EF824B51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExA.KERNEL32(?), ref: 2411C441
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000020,?,00000000,2411C4E9,?,?), ref: 2411C467
                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000020,?,00000000,2411C4E9,?,?), ref: 2411C46D
                                                                                                                                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 2411C480
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000,00000020,?,00000000,2411C4E9,?,?), ref: 2411C4AA
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000), ref: 2411C4D1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?), ref: 2411C4DA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Token$AdjustPrivilegesProcess$CloseCurrentHandleLookupOpenPrivilegeValueVersion
                                                                                                                                                                                                                    • String ID: SeDebugPrivilege
                                                                                                                                                                                                                    • API String ID: 3222167619-2896544425
                                                                                                                                                                                                                    • Opcode ID: 8168c5cd38bdd27c8b41c3622df13c108970857d4e50d44ec0955794d47e86a0
                                                                                                                                                                                                                    • Instruction ID: 9533e18d868dbf79bd32bfd0715859a2918ae8bf3baa04f07b212115b239771b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8168c5cd38bdd27c8b41c3622df13c108970857d4e50d44ec0955794d47e86a0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75216371A04208BEFB10CBA4DC85FEFBBBCEB15704F1144B1EA04E6184DA745A448FA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 2411C424: GetVersionExA.KERNEL32(?), ref: 2411C441
                                                                                                                                                                                                                      • Part of subcall function 2411C424: GetCurrentProcess.KERNEL32(00000020,?,00000000,2411C4E9,?,?), ref: 2411C467
                                                                                                                                                                                                                      • Part of subcall function 2411C424: OpenProcessToken.ADVAPI32(00000000,00000020,?,00000000,2411C4E9,?,?), ref: 2411C46D
                                                                                                                                                                                                                      • Part of subcall function 2411C424: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 2411C480
                                                                                                                                                                                                                      • Part of subcall function 2411C424: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000,00000020,?,00000000,2411C4E9,?,?), ref: 2411C4AA
                                                                                                                                                                                                                      • Part of subcall function 2411C424: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?,00000000), ref: 2411C4D1
                                                                                                                                                                                                                      • Part of subcall function 2411C424: CloseHandle.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,00000000,?,00000000,00000000,?,00000000,SeDebugPrivilege,?), ref: 2411C4DA
                                                                                                                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,2411CD0F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2411CC29
                                                                                                                                                                                                                    • CreateServiceA.ADVAPI32(00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,2411CCD4), ref: 2411CC6A
                                                                                                                                                                                                                      • Part of subcall function 240F6858: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 240F689E
                                                                                                                                                                                                                      • Part of subcall function 240F6858: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000002,00000000,00000000,00000000,240F68FD,?,?,?), ref: 240F68C6
                                                                                                                                                                                                                      • Part of subcall function 240F6858: RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,00000000,00000000,240F68FD,?,?,?), ref: 240F68D5
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2411CCBF
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,?,00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2411CCC5
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Close$HandleServiceToken$AdjustCreateOpenPrivilegesProcessValue$CurrentLookupManagerPrivilegeVersion
                                                                                                                                                                                                                    • String ID: Description$System\CurrentControlSet\Services\
                                                                                                                                                                                                                    • API String ID: 3877902884-3489731058
                                                                                                                                                                                                                    • Opcode ID: 0a0086b2cc73cb1cd3f0421674a51aeb8c74618905e159e61875df5eeb3b82f3
                                                                                                                                                                                                                    • Instruction ID: a7c1b46f10006cfee209675508d272d8400bc418021740816a4e6dce43b89a67
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0a0086b2cc73cb1cd3f0421674a51aeb8c74618905e159e61875df5eeb3b82f3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95210A70A00209BFEB01DBA0CC91FAFBBB9EF55754F114075E504E7298EE789E01DA50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 2411B36C
                                                                                                                                                                                                                    • VirtualFreeEx.KERNEL32(00000000,?,00000000,00008000,?,00000000), ref: 2411B396
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 2411B3A5
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 2411B3B8
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 2411B3C0
                                                                                                                                                                                                                    • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000), ref: 2411B3E1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 2411B3E7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Handle$ModuleVirtual$AllocCloseCreateFreeMemoryProcessRemoteThreadWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2398686212-0
                                                                                                                                                                                                                    • Opcode ID: 320e831d3db3fd37a1909f490eb8679622ef688ad2e82d5ecf3d3b5ad779abdd
                                                                                                                                                                                                                    • Instruction ID: ea8ee0bd8c37a9db8a6099aa5e98b1dadd33f9f7e843c4e86b46a19b0b7c2c76
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 320e831d3db3fd37a1909f490eb8679622ef688ad2e82d5ecf3d3b5ad779abdd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 921112B12443047FE360DB698C81F6FBBDCEBD4714F558868BA48D7285DA70E8448766
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,240F6160), ref: 240F6067
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,240F6160), ref: 240F6108
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,240F6160), ref: 240F611C
                                                                                                                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,240F6160), ref: 240F612A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseDirectoryFirstNextRemove
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 81111410-438819550
                                                                                                                                                                                                                    • Opcode ID: 589ab8de6870cd8ce73f45b36839711648b9d3e0dbcc0180ef914455842102b8
                                                                                                                                                                                                                    • Instruction ID: 54e17d97572217b81e1c3760895fb50f13166b14fd8d7cba5bdaec577459786d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 589ab8de6870cd8ce73f45b36839711648b9d3e0dbcc0180ef914455842102b8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6B416E30900608ABEB10DBA4CD90ACEB7F5BF95768F5245B5D804E7359DF34AFC68A50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,240F6160), ref: 240F6067
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,240F6160), ref: 240F6108
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,240F6160), ref: 240F611C
                                                                                                                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,240F6160), ref: 240F612A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseDirectoryFirstNextRemove
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 81111410-438819550
                                                                                                                                                                                                                    • Opcode ID: b1ff480b62c8d31f6b0df2978234ab5aa24c22028277c72224dd8734c8d120b8
                                                                                                                                                                                                                    • Instruction ID: 1531d70b103d94e1d74d5b461f95de84e7dd2692d677940b60937174c7d0f57c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b1ff480b62c8d31f6b0df2978234ab5aa24c22028277c72224dd8734c8d120b8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 42318130900508ABEB10DBE4CD4098EB7F5BF95768F5245B4D804E7259DF34AFC68A51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenClipboard.USER32(00000000), ref: 2411CFDC
                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00002002,00000000,00000000,2411D092,?,00000000), ref: 2411CFF5
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(?), ref: 2411D00F
                                                                                                                                                                                                                    • SetClipboardData.USER32(00000001,?), ref: 2411D03A
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(?), ref: 2411D050
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Global$Clipboard$AllocDataLockOpenUnlock
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3395808788-0
                                                                                                                                                                                                                    • Opcode ID: 097404531e8a21b7fb8a929bbf961608d185668a119ebf2e76a9b4bf5ff4b2bb
                                                                                                                                                                                                                    • Instruction ID: fd46ad72e37dec1d67e9fe064c312b21b398e8edf579ddaf2c89ed0e66bbf126
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 097404531e8a21b7fb8a929bbf961608d185668a119ebf2e76a9b4bf5ff4b2bb
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2901D471200644BFF7229F759CB1D2EBBACDB59A44BC30870F904C3605DD79AD11C960
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetPropA.USER32(?,OBJECT,00000000), ref: 2411EAC8
                                                                                                                                                                                                                    • GetPropA.USER32(?,OBJECT), ref: 2411EAEC
                                                                                                                                                                                                                    • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 2411EB30
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Prop$NtdllProc_Window
                                                                                                                                                                                                                    • String ID: OBJECT
                                                                                                                                                                                                                    • API String ID: 1456104087-1481993322
                                                                                                                                                                                                                    • Opcode ID: b356f9bce23f5cf68c2e5e5fde2a52d80af506bf77b50ff53fe2f27ecd1d5e73
                                                                                                                                                                                                                    • Instruction ID: 4044a0093e227a8d98c57d23e32e097e32b58f469c3fc11ba8a19cf1e1f5231a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b356f9bce23f5cf68c2e5e5fde2a52d80af506bf77b50ff53fe2f27ecd1d5e73
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CF21FE71A01219AFD710DFA8C9C4DAEBBF8EF49614B5145A9EC09E7301D7709F408BA5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00003000,00000040), ref: 2413482D
                                                                                                                                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00003000,00000040), ref: 24134840
                                                                                                                                                                                                                    • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040,00000000,00000000,00008000,?,?,00003000,00000040), ref: 2413485A
                                                                                                                                                                                                                    • WriteProcessMemory.KERNEL32(?,00000000,?,?,?,?,?,?,00003000,00000040), ref: 2413489C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$Alloc$FreeMemoryProcessWrite
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2022580353-0
                                                                                                                                                                                                                    • Opcode ID: eb6d76005167538706816c2aaeecc160133f7c664a34aac661579d818c8fe209
                                                                                                                                                                                                                    • Instruction ID: cca4e630ba75db2e7ae9e8cfbbf5fd8fcc332d84e042ac81104804fb7239a068
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb6d76005167538706816c2aaeecc160133f7c664a34aac661579d818c8fe209
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1A312F71A00245BFE750CBA9CC81F9EBBF9FB98614F5580A4E604F7644DB74EE108BA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?), ref: 2411D3AB
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?), ref: 2411D3B6
                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 2411D3CF
                                                                                                                                                                                                                    • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 2411D3E0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileTime$Find$CloseDateFirstLocal
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2659516521-0
                                                                                                                                                                                                                    • Opcode ID: 9143006eb41c45353f1fb9a1df9d4207309235395cb7662632e7840d83c7f675
                                                                                                                                                                                                                    • Instruction ID: 1ede241b11f29c94655825e4dbe32ee3d1ce9a00880b1bfc5a47e687e3075fcb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9143006eb41c45353f1fb9a1df9d4207309235395cb7662632e7840d83c7f675
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 44F012B2D1020C66DB11DBE58DC49CFB3AC6F14224F5106F6E91DD21D5EB38AB485BA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(PSAPI.dll,?,2411C0D5), ref: 2411BD48
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 2411BD64
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 2411BD76
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 2411BD88
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 2411BD9A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 2411BDAC
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 2411BDBE
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 2411BDD0
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 2411BDE2
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 2411BDF4
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EmptyWorkingSet), ref: 2411BE06
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,QueryWorkingSet), ref: 2411BE18
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeProcessForWsWatch), ref: 2411BE2A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMappedFileNameA), ref: 2411BE3C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameA), ref: 2411BE4E
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverFileNameA), ref: 2411BE60
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMappedFileNameA), ref: 2411BE72
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameA), ref: 2411BE84
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverFileNameA), ref: 2411BE96
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMappedFileNameW), ref: 2411BEA8
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameW), ref: 2411BEBA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                                                                                                                    • String ID: EmptyWorkingSet$EnumDeviceDrivers$EnumProcessModules$EnumProcesses$GetDeviceDriverBaseNameA$GetDeviceDriverBaseNameW$GetDeviceDriverFileNameA$GetDeviceDriverFileNameW$GetMappedFileNameA$GetMappedFileNameW$GetModuleBaseNameA$GetModuleBaseNameW$GetModuleFileNameExA$GetModuleFileNameExW$GetModuleInformation$GetProcessMemoryInfo$InitializeProcessForWsWatch$PSAPI.dll$QueryWorkingSet
                                                                                                                                                                                                                    • API String ID: 2238633743-2267155864
                                                                                                                                                                                                                    • Opcode ID: 2d4db1a84fcddde94c6b998c3309facc3dd338e632ce89cce69372d15775f384
                                                                                                                                                                                                                    • Instruction ID: 552ebbbbfee55f3bc4b85f8b417fa3213a071b5fa031229a6715fa04f70b3c61
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2d4db1a84fcddde94c6b998c3309facc3dd338e632ce89cce69372d15775f384
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 97411BB1A106119FEB10DFBA88D4E1D3BA8FB162443430579F808EF64DEB39D9849F95
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,240F57EB,?,?,2410E487), ref: 240F5578
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 240F5590
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 240F55A2
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 240F55B4
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 240F55C6
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 240F55D8
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 240F55EA
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 240F55FC
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 240F560E
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 240F5620
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 240F5632
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 240F5644
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 240F5656
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 240F5668
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 240F567A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 240F568C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 240F569E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                                                                                                                    • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 667068680-597814768
                                                                                                                                                                                                                    • Opcode ID: 8444a12f7f70b02fec8e8d73ec587f597cc3db0bb04e09df8ee4fe448a6397f1
                                                                                                                                                                                                                    • Instruction ID: 41f1342bb5b153fc71fb9d9f245127f62e60109077f34ec66c9041621370de1d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8444a12f7f70b02fec8e8d73ec587f597cc3db0bb04e09df8ee4fe448a6397f1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 623136F4A11A10AFEB20AFB69CD4F1D3FA8FB162447420579F400EF24BEA3995848F55
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F4F18: CreateMutexA.KERNEL32(?,?,?,?,24118D32,00000000,00000000,00000000,00000000,?,00001388,?,24118DFC,?,24118DFC,?), ref: 240F4F2E
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064,00000000,00000000,00000000,00000000,24124885,?,?,00000000,00000000,00000000), ref: 24124697
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000003F4,00000000,00000000,00000000,00000000,24124885,?,?,00000000,00000000,00000000), ref: 241246B2
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000003BC,000003F4,00000000,00000000,00000000,00000000,24124885,?,?,00000000,00000000,00000000), ref: 241246BF
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885,?,?,00000000,00000000,00000000), ref: 241246E1
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Run,?), ref: 24124707
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 2412471C
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 24124724
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,?), ref: 2412473E
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 24124753
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Run,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 2412475B
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?), ref: 24124775
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 2412478A
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 24124792
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?), ref: 241247A2
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,000003BC,000003F4,00000000), ref: 241247B7
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000000,00000000,80000001,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run,?,00000000,00000080,000003BC,000003F4), ref: 241247BF
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 241247E0
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 241247F5
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000), ref: 241247FD
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000000,00000000,80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000080,000003BC), ref: 24124814
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 24124829
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,00000000,00000000,00000000,80000002,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?), ref: 24124831
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\,00000000,00020006,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000,24124885), ref: 24124848
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 2412485D
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000,80000001,Software\,00000000,00020006,?,00000000,00000080,000003BC,000003F4,00000000,00000000,00000000,00000000), ref: 24124865
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Close$DeleteOpen$Value$Handle$AttributesCreateFileMutexSleep
                                                                                                                                                                                                                    • String ID: Software\$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run$Software\Microsoft\Windows\CurrentVersion\Run$_SAIR$exit
                                                                                                                                                                                                                    • API String ID: 2709957979-2341067361
                                                                                                                                                                                                                    • Opcode ID: 7f2011058b3a84b6ff136e8c5cd535a8d88ed1dae21dcd4f91f570005b288c22
                                                                                                                                                                                                                    • Instruction ID: 6ece36f28214a684b15d2eebf358169563991e7ed99b4d9b07868b547a4216b3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7f2011058b3a84b6ff136e8c5cd535a8d88ed1dae21dcd4f91f570005b288c22
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DB51F170700654AFE700DBA9DDC5F5A77EAFB69748F5204B0B900EB298CE78ED808B55
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindFirstFileA.KERNEL32(00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CAD
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindClose.KERNEL32(00000000,00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CB8
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 24100F9B
                                                                                                                                                                                                                    • TranslateMessage.USER32(?), ref: 24100FAC
                                                                                                                                                                                                                    • DispatchMessageA.USER32(?), ref: 24100FB8
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 24100FBD
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064,00000000,00000000,00000000,2410155C,?,2410155C,", True),?,Set objFile = objFileSystem.CreateTextFile(",00000000,24101156), ref: 24101003
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,00000064,00000000,00000000,00000000,2410155C,?,2410155C,", True),?,Set objFile = objFileSystem.CreateTextFile(",00000000,24101156), ref: 24101011
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000, / ,?,?,?,?,00000000,00000064,00000000,00000000,00000000,2410155C,?,2410155C,", True),?), ref: 24101126
                                                                                                                                                                                                                      • Part of subcall function 240F66E4: LoadLibraryA.KERNEL32(shell32.dll,ShellExecuteA,?,?,?,?,2412546A,00000000,00000000,2412E32C,2412E184,?,2412E184,?,?,2412E2A0), ref: 240F66FA
                                                                                                                                                                                                                      • Part of subcall function 240F66E4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 240F6700
                                                                                                                                                                                                                      • Part of subcall function 240F66E4: ShellExecuteA.SHELL32(00000000,open,00000000,00000000,?,?,00000000,shell32.dll,ShellExecuteA,?,?,?,?,2412546A,00000000,00000000), ref: 240F6714
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • Info = Info & "F" & CountFw & ") " & objFirewall.displayName & " v" & objFirewall.versionNumber & Enter, xrefs: 24100D7F
                                                                                                                                                                                                                    • cscript.exe, xrefs: 24100E4C, 24100EBB, 24100EF4, 24100F63
                                                                                                                                                                                                                    • CountAV = 0, xrefs: 24100D3D
                                                                                                                                                                                                                    • CountAV = CountAV + 1, xrefs: 24100DC1
                                                                                                                                                                                                                    • Set colFirewall = objSecurityCenter.ExecQuery("Select * From FirewallProduct",,48), xrefs: 24100C9B
                                                                                                                                                                                                                    • CountFW = CountFW + 1, xrefs: 24100D69
                                                                                                                                                                                                                    • For Each objFirewall In colFirewall, xrefs: 24100D53
                                                                                                                                                                                                                    • teste.txt, xrefs: 24100C65
                                                                                                                                                                                                                    • CountFW = 0, xrefs: 24100D27
                                                                                                                                                                                                                    • / , xrefs: 24101097, 241010EC
                                                                                                                                                                                                                    • For Each objAntiVirus In colAntiVirus, xrefs: 24100DAB
                                                                                                                                                                                                                    • open, xrefs: 24100ED2, 24100F7A
                                                                                                                                                                                                                    • Set colAntiVirus = objSecurityCenter.ExecQuery("Select * From AntiVirusProduct",,48), xrefs: 24100CB1
                                                                                                                                                                                                                    • Next, xrefs: 24100D95, 24100DED
                                                                                                                                                                                                                    • teste.vbs, xrefs: 24100C47
                                                                                                                                                                                                                    • Info = Info & "A" & CountAV & ") " & objAntiVirus.displayName & " v" & objAntiVirus.versionNumber & Enter, xrefs: 24100DD7
                                                                                                                                                                                                                    • Enter = Chr(13) + Chr(10), xrefs: 24100D11
                                                                                                                                                                                                                    • Set objFile = objFileSystem.CreateTextFile(", xrefs: 24100CDD
                                                                                                                                                                                                                    • objFile.Close, xrefs: 24100E19
                                                                                                                                                                                                                    • ", True), xrefs: 24100CE5
                                                                                                                                                                                                                    • Set objSecurityCenter = GetObject("winmgmts:\\.\root\SecurityCenter"), xrefs: 24100C85
                                                                                                                                                                                                                    • objFile.WriteLine(Info), xrefs: 24100E03
                                                                                                                                                                                                                    • Set objFileSystem = CreateObject("Scripting.fileSystemObject"), xrefs: 24100CC7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CountDeleteFindMessageTick$AddressCloseDispatchExecuteFirstLibraryLoadProcShellSleepTranslate
                                                                                                                                                                                                                    • String ID: / $", True)$CountAV = 0$CountAV = CountAV + 1$CountFW = 0$CountFW = CountFW + 1$Enter = Chr(13) + Chr(10)$For Each objAntiVirus In colAntiVirus$For Each objFirewall In colFirewall$Info = Info & "A" & CountAV & ") " & objAntiVirus.displayName & " v" & objAntiVirus.versionNumber & Enter$Info = Info & "F" & CountFw & ") " & objFirewall.displayName & " v" & objFirewall.versionNumber & Enter$Next$Set colAntiVirus = objSecurityCenter.ExecQuery("Select * From AntiVirusProduct",,48)$Set colFirewall = objSecurityCenter.ExecQuery("Select * From FirewallProduct",,48)$Set objFile = objFileSystem.CreateTextFile("$Set objFileSystem = CreateObject("Scripting.fileSystemObject")$Set objSecurityCenter = GetObject("winmgmts:\\.\root\SecurityCenter")$cscript.exe$objFile.Close$objFile.WriteLine(Info)$open$teste.txt$teste.vbs
                                                                                                                                                                                                                    • API String ID: 1377169233-372987553
                                                                                                                                                                                                                    • Opcode ID: 7a3c73f3fb9775ef94d5530d303705ab4120cdaa3f8c4ecbb0b75225cb7587af
                                                                                                                                                                                                                    • Instruction ID: 3a785a1d8f21faca4d9431be13d338bf17114b2b9585133f4b235daf804e6b8e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7a3c73f3fb9775ef94d5530d303705ab4120cdaa3f8c4ecbb0b75225cb7587af
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7CC16070A0011557EB12E7A49CC0B8D76A59FA571CF9294B5E804BB20CCE7DEFC24FA6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00027D20,00000000,00000000,?), ref: 24117EC0
                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 24117EF2
                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000,?,?,0000000C,00000000), ref: 24117F08
                                                                                                                                                                                                                    • GetStartupInfoA.KERNEL32(?), ref: 24117F14
                                                                                                                                                                                                                    • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000105,?,?,0000000C,00000000,?,?,0000000C,00000000), ref: 24117F58
                                                                                                                                                                                                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?,COMSPEC,?,00000105,?,?,0000000C), ref: 24117F80
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?,COMSPEC,?,00000105,?,?), ref: 24117F89
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?,COMSPEC,?,00000105,?), ref: 24117F92
                                                                                                                                                                                                                    • SetNamedPipeHandleState.KERNEL32(?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?,?), ref: 24117FAA
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF,00000010,00000000,00000000,?), ref: 24117FB1
                                                                                                                                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 24117FC1
                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,00001000,?,00000000,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 24117FEA
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00027D20,00000000,00000000,?), ref: 2411806B
                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,00001000,?,00000000,0000000A,?,00000001,00000000,00000000,?), ref: 241180B6
                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,241181C8,00000002,?,00000000,?,00000000,00000000,?,00000000,?,?,00001000,?,00000000,0000000A), ref: 241180CC
                                                                                                                                                                                                                    • GetExitCodeProcess.KERNEL32(?,00000103), ref: 241180E8
                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(?,00000000,?,00000103,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF), ref: 241180FF
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000103,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF,00000010), ref: 24118108
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,00000103,0000000A,?,00000001,00000000,00000000,?,?,00000000,?,00000000,00000000,000000FF), ref: 24118111
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateHandle$CloseProcess$FilePipe$CodeExitThreadWrite$EnvironmentInfoNamedReadSleepStartupStateTerminateVariable
                                                                                                                                                                                                                    • String ID: COMSPEC$shellresposta|shellativar|$shellresposta|shelldesativar|$shellresposta|shellresposta|
                                                                                                                                                                                                                    • API String ID: 3902820650-3990598949
                                                                                                                                                                                                                    • Opcode ID: 587a1e72be56dc420f5a34bff8531f0caa7e82aedb30fa3364d9fd4cfa11a8fd
                                                                                                                                                                                                                    • Instruction ID: decd18bbfb940dcff5daa9fa6213fc729e0ef01f4d309f5884a41f6e17ae560f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 587a1e72be56dc420f5a34bff8531f0caa7e82aedb30fa3364d9fd4cfa11a8fd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E7810171900608AFEB50DBA4CC91FDEB7BCBB18714F5144B1E648F6284DF74AB858B61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00001388,00000000,241357B3,?,?,?,?,00000000,00000000), ref: 2413527E
                                                                                                                                                                                                                      • Part of subcall function 240F6858: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 240F689E
                                                                                                                                                                                                                      • Part of subcall function 240F6858: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000002,00000000,00000000,00000000,240F68FD,?,?,?), ref: 240F68C6
                                                                                                                                                                                                                      • Part of subcall function 240F6858: RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,00000000,00000000,240F68FD,?,?,?), ref: 240F68D5
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,?,00000000,00001388,00000000,241357B3,?,?,?,?,00000000,00000000), ref: 241355C0
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 241355D6
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,80000001,Software\Microsoft\Active Setup\Installed Components\,00000000,00020006,?,?,00000000,00001388,00000000,241357B3), ref: 241355DF
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00001388,00000000,241357B3,?,?,?,?,00000000,00000000), ref: 24135613
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00001388,00000000,241357B3,?,?,?,?,00000000,00000000), ref: 24135620
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000003BC,00000000,00000000,00000000,00000000,00001388,00000000,241357B3,?,?,?,?,00000000,00000000), ref: 2413562D
                                                                                                                                                                                                                      • Part of subcall function 240F70B8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00000001,?,00000000,240F7197,?,?,Desktop), ref: 240F710D
                                                                                                                                                                                                                      • Part of subcall function 240F70B8: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,24102AE0,80000001,00000000,00000000,00000001,?,00000000,240F7197,?,?,Desktop), ref: 240F7131
                                                                                                                                                                                                                      • Part of subcall function 240F70B8: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,24102AE0,?,00000000,00000000,?,00000000,24102AE0,80000001,00000000,00000000,00000001), ref: 240F715B
                                                                                                                                                                                                                      • Part of subcall function 240F70B8: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,24102AE0,80000001,00000000,00000000,00000001,?,00000000,240F7197,?,?), ref: 240F716F
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00001388,00000000,241357B3,?,?,?,?,00000000,00000000), ref: 24135638
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00001388,00000000,241357B3,?,?,?,?,00000000,00000000), ref: 2413574D
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00001388,00000000,241357B3,?,?,?,?,00000000), ref: 2413575A
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00001388,00000000,241357B3,?,?,?,?,00000000), ref: 24135765
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Close$Handle$Value$ErrorLastOpenQuery$CreateDeleteSleep
                                                                                                                                                                                                                    • String ID: Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run$Software\Microsoft\Windows\CurrentVersion\Run$StubPath$_SAIR$open
                                                                                                                                                                                                                    • API String ID: 3574299486-1043091203
                                                                                                                                                                                                                    • Opcode ID: 19e503f8060c018566cda9548b12043d2f8011c51ee8e0770e0b7d12e668a7e8
                                                                                                                                                                                                                    • Instruction ID: 8fba1103338802b7b71cce35b2f317a0f3f1042f7038b56d353022a6a19a7f9f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 19e503f8060c018566cda9548b12043d2f8011c51ee8e0770e0b7d12e668a7e8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 33F10B71A00158DBEB00EBA8CCC0E8EB7F6BF55658F5141B5E404EB268DE78EE85CB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000004,?,?,?,00000000,2410BB82,?,?,00000004,00000000,00000000), ref: 2410B8BD
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2410B8D3
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,00000000,00000000,00000000,00000004,?,?,?,00000000,2410BB82,?,?,00000004), ref: 2410B8E1
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000002,?,?,?,00000000,2410BB82,?,?,00000004,00000000,00000000), ref: 2410B905
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2410BB82), ref: 2410B944
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000000), ref: 2410BA2C
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000004,?,00000004,00000000,00000000,00000000,00000002,?,?,?,00000000,2410BB82), ref: 2410BA67
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000007,00000000,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2410BB82), ref: 2410BB28
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,00000000,00000000,00000000,00000002,?,?,?,00000000,2410BB82,?,?,00000004,00000000,00000000), ref: 2410BB36
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$CloseOpen$Create
                                                                                                                                                                                                                    • String ID: REG_BINARY$REG_DWORD$REG_MULTI_SZ$REG_SZ$clave
                                                                                                                                                                                                                    • API String ID: 2929978649-1504967743
                                                                                                                                                                                                                    • Opcode ID: 54d7ddee6303811a1146c2e0067109d0ae0c1b507f6afbcccafabace9bbdb27a
                                                                                                                                                                                                                    • Instruction ID: 8314db524c380c1ebd86cc399062801e7f743f6e0099773f647f46c7368235be
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 54d7ddee6303811a1146c2e0067109d0ae0c1b507f6afbcccafabace9bbdb27a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 51B1F471A00109AFEB00DBE4CD80ADEB7B9BF64618F519075E914F7258EE78EF858750
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,?,00000000,00000001,?,00000000,2410B104), ref: 2410ADF4
                                                                                                                                                                                                                    • RegEnumValueA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,00000001,?,00000000), ref: 2410AE34
                                                                                                                                                                                                                    • RegEnumValueA.ADVAPI32(?,?,00000000,00003FFF,00000000,?,00000000,00003FFF,?,?,00000000,?,00000000,?,00000000,?), ref: 2410AE72
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: EnumValue$Open
                                                                                                                                                                                                                    • String ID: (Default)$(Empty)$REG_BINARY$REG_DWORD$REG_DWORD_BIG_ENDIAN$REG_EXPAND_SZ$REG_LINK$REG_MULTI_SZ$REG_NONE$REG_SZ
                                                                                                                                                                                                                    • API String ID: 1214633557-2843546354
                                                                                                                                                                                                                    • Opcode ID: 3ef722f1b83aeb0dcaf2e9d6cf05dd44c4d3ada440fc931d25a67431c5163a7b
                                                                                                                                                                                                                    • Instruction ID: 8ce92a4293ee61af877fb662a9439840848c280d1ea63579cf8f36cd0f3c58fe
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3ef722f1b83aeb0dcaf2e9d6cf05dd44c4d3ada440fc931d25a67431c5163a7b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CAB1F970A002199BEB11DB94D8C0AEEB7F9FF68314F5190B5E904B7248DB74AB858F61
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • BTMemoryLoadLibary: VirtualAlloc failed, xrefs: 24103EB3
                                                                                                                                                                                                                    • BTMemoryLoadLibary: dll dos header is not valid, xrefs: 24103E1F
                                                                                                                                                                                                                    • BTMemoryLoadLibary: Can't attach library, xrefs: 24103FCD
                                                                                                                                                                                                                    • MZ, xrefs: 24103E12
                                                                                                                                                                                                                    • BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid, xrefs: 24103E5C
                                                                                                                                                                                                                    • BTMemoryLoadLibary: BuildImportTable failed, xrefs: 24103F7F
                                                                                                                                                                                                                    • PE, xrefs: 24103E4B
                                                                                                                                                                                                                    • BTMemoryLoadLibary: Get DLLEntyPoint failed, xrefs: 24103FAD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: BTMemoryLoadLibary: BuildImportTable failed$BTMemoryLoadLibary: Can't attach library$BTMemoryLoadLibary: Get DLLEntyPoint failed$BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid$BTMemoryLoadLibary: VirtualAlloc failed$BTMemoryLoadLibary: dll dos header is not valid$MZ$PE
                                                                                                                                                                                                                    • API String ID: 0-3631919656
                                                                                                                                                                                                                    • Opcode ID: d05bbb86e32e34a24f152bd59349a6f18370b506eaf92b5aaa4ed9055e37f9fa
                                                                                                                                                                                                                    • Instruction ID: d7a9d60fd9e2c3149896545fedaadedc5e74e86f341c7345cee66e105eb3df73
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d05bbb86e32e34a24f152bd59349a6f18370b506eaf92b5aaa4ed9055e37f9fa
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17518371B04208AFE710DBA9CCD0F9DBBF4AF59714F1180A5E904FB359DA70EA418B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 2413599E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CopyFile
                                                                                                                                                                                                                    • String ID: RECYCLER\$RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$[autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$action=Open folder to view files$autorun.inf$icon=shell32.dll,4$label=PENDRIVE$shell\Open=Open$shell\Open\Default=1$shell\Open\command=$shellexecute=
                                                                                                                                                                                                                    • API String ID: 1304948518-631342129
                                                                                                                                                                                                                    • Opcode ID: 8727e34b2fce1204b6779d98cc7fdbb148fd5f9c0f4fbb796866d13350d56420
                                                                                                                                                                                                                    • Instruction ID: 27f4fa99a2c5ebd9d348a2b35c616ea1257348719b550c87453774ac7d82e0a8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8727e34b2fce1204b6779d98cc7fdbb148fd5f9c0f4fbb796866d13350d56420
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8741C930A00109ABDB00EBA5DCD0D9DBBB6EF59A18FA245A4E401BB25DCF74AF458F54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetModuleHandleA), ref: 24134145
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 2413414B
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 2413415E
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 24134164
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,ExitThread,00000000,kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 24134177
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 2413417D
                                                                                                                                                                                                                      • Part of subcall function 24133EC0: VirtualAllocEx.KERNEL32(?,00000000,00000001,00003000,00000040,00000000,24133F3E,?,?,?,?,00000000,00000000,00000000), ref: 24133EFC
                                                                                                                                                                                                                      • Part of subcall function 24133EC0: WriteProcessMemory.KERNEL32(?,00000000,?,00000001,?,?,00000000,00000001,00003000,00000040,00000000,24133F3E), ref: 24133F1E
                                                                                                                                                                                                                      • Part of subcall function 24133F80: CreateRemoteThread.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 24133FBE
                                                                                                                                                                                                                      • Part of subcall function 24133F80: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 24133FCE
                                                                                                                                                                                                                      • Part of subcall function 24133F80: ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 24133FE1
                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,kernel32,ExitThread,00000000,kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 241341BD
                                                                                                                                                                                                                    • GetExitCodeThread.KERNEL32(00000000,?,00000000,000000FF,00000000,kernel32,ExitThread,00000000,kernel32,GetProcAddress,00000000,kernel32,GetModuleHandleA), ref: 241341C4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressHandleModuleProc$MemoryObjectProcessSingleThreadWait$AllocCodeCreateExitReadRemoteVirtualWrite
                                                                                                                                                                                                                    • String ID: ExitThread$GetModuleHandleA$GetProcAddress$kernel32
                                                                                                                                                                                                                    • API String ID: 3826234517-3123223305
                                                                                                                                                                                                                    • Opcode ID: 3d107cd32fcdff0593348af6593c25d1f67eef5fa3bd4022c16f38065528386a
                                                                                                                                                                                                                    • Instruction ID: 21620f528f8cdbf54650fbbeee3739b764d18337792c9afa592608aa5c3ea906
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d107cd32fcdff0593348af6593c25d1f67eef5fa3bd4022c16f38065528386a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A201C46070431427E320AEBA4CD1E1F7E889FB1114F824938F954A728ADE74EE444795
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,.txt,2.6,Spy-Net ,241027EC,?,00000000,241027C7,?,?), ref: 241026C4
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,.txt,2.6,Spy-Net ,241027EC,?,00000000,241027C7), ref: 241026CC
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000003,00000000,00000000,24102850,24102850,?,2410285C,24102850,00000000,24102844,00000000,24102844), ref: 24102768
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000,24102850,24102850,?,2410285C,24102850), ref: 2410277B
                                                                                                                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000,00000000), ref: 24102799
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000002,00000000,40000000,00000002,00000000,00000003,00000000), ref: 2410279F
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$CloseCreateHandle$PointerWrite
                                                                                                                                                                                                                    • String ID: --- $.txt$2.6$Desktop$Spy-Net
                                                                                                                                                                                                                    • API String ID: 2606874340-3792867649
                                                                                                                                                                                                                    • Opcode ID: 78822adaa20c4a73af220ef3d7a9e6702b4d79599abc689e2c1cab7ecb13354f
                                                                                                                                                                                                                    • Instruction ID: 09e3e387e1077ba1c077768e28705996eb932e64f2996161dc583e4c488c3a60
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 78822adaa20c4a73af220ef3d7a9e6702b4d79599abc689e2c1cab7ecb13354f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6E419530940208BBFB15D7A0CCD1FEE77B8EB68714F529471FA00BA099DE74AF858A14
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 24132F9F
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,2413337E,?,00000000,241333AD,?,?,?,?,00000011,00000000), ref: 24132FFE
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,2413337E,?,00000000,241333AD,?,?,?,?,00000011,00000000), ref: 241330A7
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 241330F1
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,2413337E,?,00000000,241333AD,?,?,?,?,00000011,00000000), ref: 24133150
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 2413319A
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,2413337E,?,00000000,241333AD,?,?,?,?,00000011,00000000), ref: 241331F9
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 24133243
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,2413337E,?,00000000,241333AD,?,?,?,?,00000011,00000000), ref: 241332A2
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 241332F2
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 24133048
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindFirstFileA.KERNEL32(00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CAD
                                                                                                                                                                                                                      • Part of subcall function 240F6C78: FindClose.KERNEL32(00000000,00000000,?,00000000,240F6CD5,?,2413B97C,?,240F6662,00000000,240F66D3,?,?,?,2413B97C), ref: 240F6CB8
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,2413337E,?,00000000,241333AD,?,?,?,?,00000011,00000000), ref: 2413336F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$AttributesCopy$Find$CloseFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1833752699-0
                                                                                                                                                                                                                    • Opcode ID: 3a92fd7bcce21e5fcb3224dedd65d1fb5dcd1ab4c70876be3e45c859901b5ca8
                                                                                                                                                                                                                    • Instruction ID: b03e173020bb745d83b5d990b79a6150cc7f8403096e7295f095b9fd6bbc984f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3a92fd7bcce21e5fcb3224dedd65d1fb5dcd1ab4c70876be3e45c859901b5ca8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 87D10731A0029C9FEB50EBA4DD81ECDBBB9BF64614F124971E404EB118DF74AF868B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 24117471
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 24117479
                                                                                                                                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 24117481
                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 24117492
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 241174B0
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000A), ref: 241174BA
                                                                                                                                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,00000000,00000000), ref: 241174CA
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 241174D7
                                                                                                                                                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00CC0020), ref: 241174F5
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,0000000A), ref: 24117500
                                                                                                                                                                                                                    • DeleteDC.GDI32(00000000), ref: 24117506
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 2411750D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CapsCompatibleCreateDeviceObjectSelect$BitmapClientDeleteDesktopRectReleaseWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 337914687-0
                                                                                                                                                                                                                    • Opcode ID: f1b76e16a75b4e8c41da1ba234a25fc9606e6697ddba96ae8bac77b0f0e9eb6f
                                                                                                                                                                                                                    • Instruction ID: 93c17b19677ea8884ed82218fd984536cc18c4bd36585ffa8a6101b09aacf749
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f1b76e16a75b4e8c41da1ba234a25fc9606e6697ddba96ae8bac77b0f0e9eb6f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 641181711447057FE320ABA8CC80F7F7AECEF92654F424A38F984A7246DE30A9404772
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,?,00000000,00000008,?,00000000,2411BC14,?,?,?,?,00000000,00000000), ref: 2411BA83
                                                                                                                                                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,00000008,?,00000000), ref: 2411BBDB
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,00000008,?), ref: 2411BBEC
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseEnumOpen
                                                                                                                                                                                                                    • String ID: ##@@$DisplayName$NNN$QuietUninstallString$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$UninstallString$YYY
                                                                                                                                                                                                                    • API String ID: 1332880857-2804227269
                                                                                                                                                                                                                    • Opcode ID: f0246bff8d63bab93cccc5eabc9a50c7b1d3701b96bfc158b6b290078a9b72ef
                                                                                                                                                                                                                    • Instruction ID: 3514ccc0901e60d866f1b2ab1b1eaaa39501a319980d2a51355e8db5703e9987
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f0246bff8d63bab93cccc5eabc9a50c7b1d3701b96bfc158b6b290078a9b72ef
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 23512E30A00149ABEB00DBA9CDD0FDEB7B9BF68218F524075E518B7298DE789F45CB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 241172F4
                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 241173B2
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 241173C2
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 241173CD
                                                                                                                                                                                                                    • GetDIBits.GDI32(?,?,00000000,?,?,00000000,00000000), ref: 241173EF
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 24117432
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 24117438
                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 2411743E
                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 24117452
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Global$Object$AllocBitsDeleteFreeLockReleaseUnlock
                                                                                                                                                                                                                    • String ID: BM
                                                                                                                                                                                                                    • API String ID: 668871282-2348483157
                                                                                                                                                                                                                    • Opcode ID: 7239cca198844cb54eff92d7bf05901ef6670e854347018845be8973e6573da8
                                                                                                                                                                                                                    • Instruction ID: b1af74f2699bd09656ccb1cf9345d97af69707c0a5b62beef28a91a5f5d417c3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7239cca198844cb54eff92d7bf05901ef6670e854347018845be8973e6573da8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48415A716087019FE344DF69C880A5FBBE9EF98304F058939F9988B365EB70D9458B92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSecurityInfo.ADVAPI32(00000000,00000006,00000004,00000000,00000000,00000000,00000000), ref: 241335E5
                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,00000000,00000006,00000004,00000000,00000000,00000000,00000000), ref: 241335FA
                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,00000000,00000006,00000004,00000000,00000000,00000000,00000000), ref: 2413360B
                                                                                                                                                                                                                    • SetEntriesInAclA.ADVAPI32(00000001,00000000,00000000,?), ref: 24133651
                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,00000000,00000006,00000004,00000000,00000000), ref: 24133666
                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,00000000,00000006,00000004,00000000,00000000), ref: 24133677
                                                                                                                                                                                                                    • SetSecurityInfo.ADVAPI32(00000000,00000006,00000004,00000000,00000000,00000002,00000000,00000000,00000006,00000004,00000000,00000000), ref: 2413368C
                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,00000000,00000006,00000004,00000000,00000000,00000002,00000000,00000000,00000006,00000004,00000000,00000000), ref: 241336A1
                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,00000000,00000006,00000004,00000000,00000000,00000002,00000000,00000000,00000006,00000004,00000000,00000000), ref: 241336B2
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FreeLocal$InfoSecurity$Entries
                                                                                                                                                                                                                    • String ID: CURRENT_USER
                                                                                                                                                                                                                    • API String ID: 3140748100-382982459
                                                                                                                                                                                                                    • Opcode ID: 78b3ad13c6273b4630525833365623b4a906c0bcfa728375a3912d8b01a19b38
                                                                                                                                                                                                                    • Instruction ID: 44dfcf215874cccc62ef7c0ed617e7507759b9aca8ed44f262b1fe7120887a0a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 78b3ad13c6273b4630525833365623b4a906c0bcfa728375a3912d8b01a19b38
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A23101B0608304AFE711DF64CC85B9B7BD8AB94744F008869F684C7295D7B5DA84CB67
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ExitProcess.KERNEL32(00000000,00000000,2410EBCE), ref: 2410EA5D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExitProcess
                                                                                                                                                                                                                    • String ID: EnviarStream$GetChromePass$GetContactList$GetCurrentMSNSettings$GetMSNStatus$Mozilla3_5Password$SetMSNStatus$StartHttpProxy
                                                                                                                                                                                                                    • API String ID: 621844428-2405909186
                                                                                                                                                                                                                    • Opcode ID: 4d99dc32f47aa2bb2f12483a4655e7d38ec9fb567f68e734061c0df9688d2d2c
                                                                                                                                                                                                                    • Instruction ID: ea66e061aba04361e68079239fbd75fdba2c9d01ddbdd9cd3932bdd17acd7de6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d99dc32f47aa2bb2f12483a4655e7d38ec9fb567f68e734061c0df9688d2d2c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1551A471A04209EFE701DF66CCD1AAEBBF8FB55214B43D075E814F6204EB789B418B95
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 2411D15C: RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000001,?,00000000,2411D228), ref: 2411D194
                                                                                                                                                                                                                      • Part of subcall function 2411D15C: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,?,00000000,2411D228), ref: 2411D1B8
                                                                                                                                                                                                                      • Part of subcall function 2411D15C: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001), ref: 2411D1E2
                                                                                                                                                                                                                      • Part of subcall function 2411D15C: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000), ref: 2411D1FC
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(00000000,SteamDecryptDataForThisMachine,?,00000000,?,?,00000000,2411D7AC,?,00000000,2411D7D9,?,?,?,?,00000000), ref: 2411D75A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 2411D760
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: QueryValue$AddressCloseLibraryLoadOpenProc
                                                                                                                                                                                                                    • String ID: /ClientRegistry.Blob$Phrase$Software\Valve\Steam\$SteamDecryptDataForThisMachine$SteamPath$\ClientRegistry.blob$\steam.dll
                                                                                                                                                                                                                    • API String ID: 2859330212-1198945235
                                                                                                                                                                                                                    • Opcode ID: d3d585771ce96164ff2e908c7199eb263af1078e405f13ca4a554f2da80f4e53
                                                                                                                                                                                                                    • Instruction ID: dc5459f8b1ed535dbcc9966f4b4522088c56f732161ecb14c6e5ef4585279a8c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d3d585771ce96164ff2e908c7199eb263af1078e405f13ca4a554f2da80f4e53
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 264183727082049FE704DF69D8D095EFBA9EB58354B5240B5F804F7348EA78EE81CB58
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 241015AB
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatusEx), ref: 241015BC
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,00000000,GlobalMemoryStatusEx,kernel32.dll), ref: 241015C6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                    • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 145871493-802862622
                                                                                                                                                                                                                    • Opcode ID: 7ec2693c1a71313d8b8fa56188ef193370d9429ec34e7c254d64a69b2304aa94
                                                                                                                                                                                                                    • Instruction ID: 527c266e3d8a25cc564cebfdacd23d9a1300b764176a60f4c7634abd75d7d131
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7ec2693c1a71313d8b8fa56188ef193370d9429ec34e7c254d64a69b2304aa94
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E5519774A08301AF9341CF2AC880A0BBBE1AFC8764F55D96DF8A8C7354E739D9418F52
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 240F1894
                                                                                                                                                                                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 240F18B8
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 240F18D4
                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000), ref: 240F18F5
                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 240F191E
                                                                                                                                                                                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 240F192C
                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 240F1967
                                                                                                                                                                                                                    • GetFileType.KERNEL32(?,000000F5), ref: 240F197D
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 240F1998
                                                                                                                                                                                                                    • GetLastError.KERNEL32(000000F5), ref: 240F19B0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1694776339-0
                                                                                                                                                                                                                    • Opcode ID: 9c8645bdce33a65cdf9198f78138e9363998eaec938cc069b47d231b9e783e1e
                                                                                                                                                                                                                    • Instruction ID: 4f651fe4297a0d055572b2e1de19f1e7b8df9f01040d10097d8ea164f88810d7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9c8645bdce33a65cdf9198f78138e9363998eaec938cc069b47d231b9e783e1e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9641D4305087019AF7238F20CD00B667AE5EF40754F228E3DD5DA8E9DCEE659DC18792
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 2411DC3D
                                                                                                                                                                                                                    • GetWindow.USER32(00000000,00000005), ref: 2411DC45
                                                                                                                                                                                                                    • GetClassNameA.USER32(00000000,?,00000080), ref: 2411DC5D
                                                                                                                                                                                                                    • GetWindow.USER32(00000000,00000002), ref: 2411DCAE
                                                                                                                                                                                                                      • Part of subcall function 240F5948: CharUpperA.USER32(?,00000000,240F59BD,?,241432F8,24143310,00000008,?,?,24131C03,00000010,00000000,24131D9B,?,24143304,2414330C), ref: 240F5986
                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,00000001,Shell_TrayWnd,00000000,00000000,2411DCDA), ref: 2411DC9C
                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,00000000,Shell_TrayWnd,00000000,00000000,2411DCDA), ref: 2411DCA6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Show$CharClassFindNameUpper
                                                                                                                                                                                                                    • String ID: BUTTON$Shell_TrayWnd
                                                                                                                                                                                                                    • API String ID: 1958926019-3627955571
                                                                                                                                                                                                                    • Opcode ID: 81960d50aa4d618749c8099aa868a476b77773b21e2b3cc9a366c27739985873
                                                                                                                                                                                                                    • Instruction ID: 48a599d920d892ac2a4cec61c662c0eb93d3b53c08006d49b5d69082e1204558
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 81960d50aa4d618749c8099aa868a476b77773b21e2b3cc9a366c27739985873
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3011E6309006286BE732D761CD91FCD7668AF55314F8388F4E908F2185EEB4BF854B95
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,Sleep,00000000,241340C6), ref: 24134057
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 2413405D
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA,00000000,kernel32,Sleep,00000000,241340C6), ref: 2413406F
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32), ref: 24134075
                                                                                                                                                                                                                      • Part of subcall function 24133EC0: VirtualAllocEx.KERNEL32(?,00000000,00000001,00003000,00000040,00000000,24133F3E,?,?,?,?,00000000,00000000,00000000), ref: 24133EFC
                                                                                                                                                                                                                      • Part of subcall function 24133EC0: WriteProcessMemory.KERNEL32(?,00000000,?,00000001,?,?,00000000,00000001,00003000,00000040,00000000,24133F3E), ref: 24133F1E
                                                                                                                                                                                                                      • Part of subcall function 24133F80: CreateRemoteThread.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 24133FBE
                                                                                                                                                                                                                      • Part of subcall function 24133F80: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 24133FCE
                                                                                                                                                                                                                      • Part of subcall function 24133F80: ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,00000000,000000FF,?,00000000,00000000,00000000,00000000,00000000,?), ref: 24133FE1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,kernel32,LoadLibraryA,00000000,kernel32,Sleep,00000000,241340C6), ref: 241340A9
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Handle$AddressMemoryModuleProcProcess$AllocCloseCreateObjectReadRemoteSingleThreadVirtualWaitWrite
                                                                                                                                                                                                                    • String ID: LoadLibraryA$Sleep$kernel32
                                                                                                                                                                                                                    • API String ID: 3487503967-1813742806
                                                                                                                                                                                                                    • Opcode ID: 8abe58aae467ca840bafb4dd5acd9d7b4aa57ddce9e3b311ea94dfb92e41ab68
                                                                                                                                                                                                                    • Instruction ID: 2345b90ac93eaa336d49e0c5f1db0c0a9f2632d41a7074ea9a8f570604afd6dd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8abe58aae467ca840bafb4dd5acd9d7b4aa57ddce9e3b311ea94dfb92e41ab68
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B6019670B04604BFEB20EFB58CD1F9E7EA8AF54254B924475E800E7249DE749F448A59
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegEnumValueA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2410BF43,?,00000000,2410BF60), ref: 2410BE4E
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2410BF43), ref: 2410BE74
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2410BE85
                                                                                                                                                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,00002000,00000000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2410BEB9
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2410BED5
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2410BEEE
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,?,?,00000000,00000000,00000200,00000000,?,00002000,00000000), ref: 2410BF08
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2410BF17
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,?,?,00000000,00000000,00000200,00000000,?,00002000,00000000), ref: 2410BF20
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$CloseCreateDeleteEnum
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 925550085-0
                                                                                                                                                                                                                    • Opcode ID: e82c8c10248cd29e259fc3c1cd749b3032d90ff585ed922bf698f8883ca543c7
                                                                                                                                                                                                                    • Instruction ID: 0e4177308dd4ee5a179a1e11a9db0e6db4c0679373d0d1351749842ee1eb94ea
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e82c8c10248cd29e259fc3c1cd749b3032d90ff585ed922bf698f8883ca543c7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8341E0B1A002096FEB01DBD5CD81EEFB7FDEB69604F414074EA10E7244DB78AA458B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(00000000,?,00000001,00000000,24103BD1,?,00000000,?,00000000,?,24103F76,?,00004550,00004550,?,00000000), ref: 24103A62
                                                                                                                                                                                                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 24103BA2
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • BuildImportTable: can't load library: , xrefs: 24103A8E
                                                                                                                                                                                                                    • BuildImportTable: ReallocMemory failed, xrefs: 24103AD6
                                                                                                                                                                                                                    • BuildImportTable: GetProcAddress failed, xrefs: 24103B7D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoadRead
                                                                                                                                                                                                                    • String ID: BuildImportTable: GetProcAddress failed$BuildImportTable: ReallocMemory failed$BuildImportTable: can't load library:
                                                                                                                                                                                                                    • API String ID: 1452896035-1384308123
                                                                                                                                                                                                                    • Opcode ID: 416a70612c42c73dbe90b79ee500e265aab13493176230192c7359575393da95
                                                                                                                                                                                                                    • Instruction ID: fbc7f864d8c61e367f3dd7af349c9300ab23ee8f1ba1daa8c2a763e98070ee7a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 416a70612c42c73dbe90b79ee500e265aab13493176230192c7359575393da95
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 82514C70A0821DAFDB10CFA8C8C0B9DB7B4BF09318F41D5A6D814E7345DBB4EA858B94
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CleanupStartupinet_addr
                                                                                                                                                                                                                    • String ID: 127.0.0.1$localhost
                                                                                                                                                                                                                    • API String ID: 4189620951-2339935011
                                                                                                                                                                                                                    • Opcode ID: c9451c2bed2c3ec085d2ea5efc2c3726fdafa79b62e3b9d1f5235f642661c02d
                                                                                                                                                                                                                    • Instruction ID: 28441754119c733f03daa2935cfc0bdad21d7f101c02a91a8fbb5fd91619011f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c9451c2bed2c3ec085d2ea5efc2c3726fdafa79b62e3b9d1f5235f642661c02d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1F1149317142046BF740ABFC4CE09EA72DC9F68624B42E5B6EE04D7289EEB6CF514691
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D,?,?,00000000,00000000), ref: 240F152B
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D,?,?,00000000), ref: 240F1535
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D,?,?,00000000), ref: 240F1552
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D,?,?,00000000,00000000), ref: 240F155C
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D,?,?,00000000), ref: 240F1585
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D), ref: 240F158F
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D), ref: 240F15B3
                                                                                                                                                                                                                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,240F1626,?,?,2413B97C,24134C34,00000000,24134C9D,?,?,00000000), ref: 240F15BD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CharNext
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3213498283-0
                                                                                                                                                                                                                    • Opcode ID: 53bc9808c7aaaf10bef2a0b4c7be660ee445fb4df034681d114db59d401db64d
                                                                                                                                                                                                                    • Instruction ID: 5cb70370d5e4b9d116f1b296ec62d6b95c73f6925901a5bc65ab3e8d59a03610
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 53bc9808c7aaaf10bef2a0b4c7be660ee445fb4df034681d114db59d401db64d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DE212288B483C19AEB2339F86CC07497BCA4B5A848B5714B4C583CF20BDC64ACC68366
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,2411C93E), ref: 2411C89D
                                                                                                                                                                                                                    • OpenServiceA.ADVAPI32(00000000,00000000,00000020,00000000,00000000,000F003F,00000000,2411C93E), ref: 2411C8CD
                                                                                                                                                                                                                    • StartServiceA.ADVAPI32(00000000,00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,2411C93E), ref: 2411C8F5
                                                                                                                                                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,2411C93E), ref: 2411C903
                                                                                                                                                                                                                    • QueryServiceStatus.ADVAPI32(00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,2411C93E), ref: 2411C90D
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,2411C93E), ref: 2411C913
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,2411C93E), ref: 2411C919
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Service$CloseHandleOpen$ControlManagerQueryStartStatus
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1698138069-0
                                                                                                                                                                                                                    • Opcode ID: dcc2cef72e683e7149f28ba273d574b800220e370ec5634c56bab518f9faca29
                                                                                                                                                                                                                    • Instruction ID: 4bf5768489b506f3682925d22a21971a3e0dfb2f84982b8c2831e091a5a0863e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dcc2cef72e683e7149f28ba273d574b800220e370ec5634c56bab518f9faca29
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F6219271E00218AEEB41DB788CC4FEEB7BDDB69A24F114475E408E3244FA759B41EA64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindow.USER32(00000000), ref: 2411F51F
                                                                                                                                                                                                                    • SetPropA.USER32(?,OBJECT), ref: 2411F532
                                                                                                                                                                                                                    • SetWindowLongA.USER32(?,000000FC,Function_0002F404), ref: 2411F542
                                                                                                                                                                                                                    • SetPropA.USER32(?,WNDPROC,00000000), ref: 2411F551
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: PropWindow$Long
                                                                                                                                                                                                                    • String ID: OBJECT$WNDPROC
                                                                                                                                                                                                                    • API String ID: 109861939-55689305
                                                                                                                                                                                                                    • Opcode ID: 9b6a92978ac5ae73473477540457b56ac656adbc0e64dbe62c3a0735dc9899b8
                                                                                                                                                                                                                    • Instruction ID: 7d9222bed19195124dc730dd926e4e11155ce6ec0332fb68523414b758274531
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9b6a92978ac5ae73473477540457b56ac656adbc0e64dbe62c3a0735dc9899b8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7317176A002489FD740CFA9CCC0D5EB7F9EB4D214B518174B909EB349DB74ED458B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(ntdll.dll,2413394B,2413B980,?,24133A12,24136642,SQLite3.dll,241367CC,?,logs.dat,241367CC,?,00000000,00000000,Function_000451BC,00000000), ref: 24133531
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,RtlInitUnicodeString), ref: 24133552
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,ZwOpenSection), ref: 24133567
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                                                                                                                    • String ID: RtlInitUnicodeString$ZwOpenSection$ntdll.dll
                                                                                                                                                                                                                    • API String ID: 2238633743-2527063403
                                                                                                                                                                                                                    • Opcode ID: f70b4c1b073bdf257a111a211318434b1739d3cde2ee8bfd775852c55b188102
                                                                                                                                                                                                                    • Instruction ID: 217ba0910ee173a84509e587d988d3df6e1e274803861fae233155b02225e8f6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f70b4c1b073bdf257a111a211318434b1739d3cde2ee8bfd775852c55b188102
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C0E0ECB2B152049FE7009F76CA94A0D3F94F7A5249B820868F408B7989DB7D81449F54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020006,?,?,?,?,00000000,2410B63D,?,?,00000003,00000000,00000000), ref: 2410B4CE
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2410B4F1
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2410B63D,?,?,00000003,00000000), ref: 2410B615
                                                                                                                                                                                                                      • Part of subcall function 2410A9BC: RegOpenKeyExA.ADVAPI32(00000000,?,00000000,?,00000000,00000008,?,00000000,2410AB1D), ref: 2410AA71
                                                                                                                                                                                                                      • Part of subcall function 2410A9BC: RegEnumKeyExA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,00000008,?,00000000), ref: 2410AAD4
                                                                                                                                                                                                                      • Part of subcall function 2410A9BC: RegCloseKey.ADVAPI32(?,?,00000001,00000000,000000FF,00000000,00000000,00000000,?,?,00000000,00000000,000000FF,00000000,00000000,00000000), ref: 2410AAE1
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2410B58E
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000002,?,?,?,00000000,2410B63D,?,?,00000003,00000000,00000000), ref: 2410B5F5
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000002,?,?,?,00000000,2410B63D,?,?,00000003,00000000,00000000), ref: 2410B607
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: DeleteOpen$Close$EnumValue
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1347035672-0
                                                                                                                                                                                                                    • Opcode ID: 6297b7789687b60b8f720b9dd849c9c29bc87fd75186d03c50acbdd97e83bcec
                                                                                                                                                                                                                    • Instruction ID: 18a441e748e7aeb3e352abff50e53ff99ece9dc7fc8c3e200c6e49715cd773c5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6297b7789687b60b8f720b9dd849c9c29bc87fd75186d03c50acbdd97e83bcec
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AB611171A001099BEB40EBE4DD80AEEB7F9FF68218F519471E910E7258EE74EE448B50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,?,00000000,0002001B,?,?,00000000,2410BD96,?,?,?,?,00000000,00000000), ref: 2410BCEF
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00000000,?,00000000,0002001B,?,?,00000000,2410BD96), ref: 2410BD09
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,00000000,00000000,?,00000000), ref: 2410BD2C
                                                                                                                                                                                                                    • RegSetValueExA.ADVAPI32(?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?,?,00000000,?), ref: 2410BD48
                                                                                                                                                                                                                    • RegDeleteValueA.ADVAPI32(?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 2410BD56
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,00000000,00000000,?,00000000,0002001B,?,?,00000000,2410BD96,?,?,?,?,00000000,00000000), ref: 2410BD6E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$Query$CloseDeleteOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2877093821-0
                                                                                                                                                                                                                    • Opcode ID: c2e1492d56e57d1ba8781bf1a1731e0f236002eb4be432e85ca611a0b7749c16
                                                                                                                                                                                                                    • Instruction ID: 0f328a4e1666480984c2926be10c0227c774cbbf6bd2519dccf48f4ba82c67f3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c2e1492d56e57d1ba8781bf1a1731e0f236002eb4be432e85ca611a0b7749c16
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DB41F176A00118ABEB01DAE4CD80EEFF7BDEF58614F118466E900E7254EE74EE418B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenClipboard.USER32 ref: 2411CF15
                                                                                                                                                                                                                    • GetClipboardData.USER32(00000001), ref: 2411CF32
                                                                                                                                                                                                                    • GlobalSize.KERNEL32(00000000), ref: 2411CF52
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 2411CF5C
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 2411CF7D
                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 2411CFAD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClipboardGlobal$CloseDataLockOpenSizeUnlock
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1964585863-0
                                                                                                                                                                                                                    • Opcode ID: 440252957ee3157b1bdea645ef3a49cae56cde3a53a3d34c58e029789d3572a3
                                                                                                                                                                                                                    • Instruction ID: b82e28efe2fd86b7b408c1b2ff402cf89cd2fb3a9a3522e2baf2a40663299797
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 440252957ee3157b1bdea645ef3a49cae56cde3a53a3d34c58e029789d3572a3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C311B434904204BFEB11DBB9CCA1A9EBBE8EB59714F9344B1E804D3655EE799A00DA60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000032,?,00000000,241231F8,?,?,?,?,00000000,00000000), ref: 24122E74
                                                                                                                                                                                                                      • Part of subcall function 24122DC8: GetTickCount.KERNEL32 ref: 24123070
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountSleepTick
                                                                                                                                                                                                                    • String ID: *.*$.tmp$ALL
                                                                                                                                                                                                                    • API String ID: 2804873075-513194922
                                                                                                                                                                                                                    • Opcode ID: e9b6951eb69824657e20d054449e66f4962b5f1110cc1787bffe1d4667a71d13
                                                                                                                                                                                                                    • Instruction ID: 0f57592d7731e4a2e45022a7715b7f43a6bcba0df39851049281ee177d3c31be
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e9b6951eb69824657e20d054449e66f4962b5f1110cc1787bffe1d4667a71d13
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AEB19E30A0062D9BEB15DB60CC90AEEB3B5EB95318F5284F5D804E7258DFB5EF858B50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 24130124
                                                                                                                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 24130162
                                                                                                                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00000000,00000000,.txt,?,00000000,00000000,?,00000000,241302D7,?,?,00000000,00000000), ref: 2413016D
                                                                                                                                                                                                                      • Part of subcall function 24102134: InternetOpenA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 241021C0
                                                                                                                                                                                                                      • Part of subcall function 24102134: InternetConnectA.WININET(00000000,00000000,00000000,00000000,00000000,00000001,08000000,00000000), ref: 241021F8
                                                                                                                                                                                                                      • Part of subcall function 241023C4: FtpOpenFileA.WININET(00000000,00000000,40000000,00000002,00000000), ref: 24102431
                                                                                                                                                                                                                      • Part of subcall function 241023C4: InternetWriteFile.WININET(00000000,?,00000001,?), ref: 2410248F
                                                                                                                                                                                                                      • Part of subcall function 241023C4: InternetCloseHandle.WININET(00000000), ref: 241024DE
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileInternet$Open$AttributesCloseConnectCopyCountHandleTickWrite
                                                                                                                                                                                                                    • String ID: .txt$___
                                                                                                                                                                                                                    • API String ID: 3003208719-4103982732
                                                                                                                                                                                                                    • Opcode ID: a536039d023c2b76ae7fab1105f0e0d4c2eb55ac6a88eb871de8771ea9d40cc9
                                                                                                                                                                                                                    • Instruction ID: 44c41f59fc5f4afff6b21ff36d5bf8281ea0cc42d09195fc59ab3e1eabc39db2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a536039d023c2b76ae7fab1105f0e0d4c2eb55ac6a88eb871de8771ea9d40cc9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 44510830A00209AFEB01EBA5DDD0F9D7FF6EF68604F524475E500A7259CE79AE858F50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetPropA.USER32(?,WNDPROC), ref: 2411F41C
                                                                                                                                                                                                                    • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 2411F429
                                                                                                                                                                                                                    • GetPropA.USER32(?,OBJECT), ref: 2411F437
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Prop$CallProcWindow
                                                                                                                                                                                                                    • String ID: OBJECT$WNDPROC
                                                                                                                                                                                                                    • API String ID: 1345539330-55689305
                                                                                                                                                                                                                    • Opcode ID: 8348d3d0837fbf42b6ad2942b1b84abfff0e2d55f04af329e747bae7096479bc
                                                                                                                                                                                                                    • Instruction ID: 82bc1d2e31e5cd27ebfbad23d337ce1b832a82b0e1d3e4175eac465c212d11ce
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8348d3d0837fbf42b6ad2942b1b84abfff0e2d55f04af329e747bae7096479bc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B60144B1A00209AB9B10CFA5CD848DFBBBDEF85250B118265A905A7605DA309F00CBF1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00002000,00000001), ref: 241345EB
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,00002000,00000001), ref: 24134611
                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,00001000,00000004,?,?,00002000,00000001), ref: 2413463B
                                                                                                                                                                                                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,00000002,?,?,?,00001000,00000004,?,?,00002000,00000001), ref: 24134693
                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,?,00000000,?,00000001), ref: 24134756
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$Alloc$Protect
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 655996629-0
                                                                                                                                                                                                                    • Opcode ID: b699cdd7bc206e5ba009274c54cd050503c0e4d50f8bdc436202f7b92cd5b323
                                                                                                                                                                                                                    • Instruction ID: 1810af5d2519482fb5b53f63461b979fadf6355addecdc091a6150828b87032e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b699cdd7bc206e5ba009274c54cd050503c0e4d50f8bdc436202f7b92cd5b323
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9071D175A00208AFDB50CFA9D9C1EAEBBF9FF48314F1580A5E904EB255D674EE44CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,audio,241222BC,241222BC,resposta,|Y|,00000000,241220D2,?,00000000,24122222,?,00000000,24122284), ref: 241220E1
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep
                                                                                                                                                                                                                    • String ID: audio$audiogetbuffer$resposta$|Y|
                                                                                                                                                                                                                    • API String ID: 3472027048-441611841
                                                                                                                                                                                                                    • Opcode ID: df5906f36d469ff1dfd9af4ac3877a524138bc9276a09137f3b9715c9fc553d8
                                                                                                                                                                                                                    • Instruction ID: 488aa52959354f3dd87f1f709a6d209a059d5a7fbe189dabe988527d4d55955c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: df5906f36d469ff1dfd9af4ac3877a524138bc9276a09137f3b9715c9fc553d8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7A515834700A599FD305CF66EC90E99B7F0FB68304B5284B5F804EBB14E7BA9A40CB54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,2411B060,?,?,?,?,2411B060,2413B98C,2411B060,resposta,|Y|,2413B8DC,00000000,2411B027), ref: 2411AECC
                                                                                                                                                                                                                      • Part of subcall function 24102B24: getpeername.WS2_32(?,?), ref: 24102B3B
                                                                                                                                                                                                                      • Part of subcall function 24102B24: inet_ntoa.WS2_32(?), ref: 24102B44
                                                                                                                                                                                                                      • Part of subcall function 24102B58: getpeername.WS2_32(?,?), ref: 24102B6C
                                                                                                                                                                                                                      • Part of subcall function 24102B58: htons.WS2_32(?), ref: 24102B77
                                                                                                                                                                                                                      • Part of subcall function 24102908: socket.WS2_32(00000002,00000001,00000006), ref: 24102959
                                                                                                                                                                                                                      • Part of subcall function 24102908: htons.WS2_32(?), ref: 24102968
                                                                                                                                                                                                                      • Part of subcall function 24102908: inet_addr.WS2_32(00000000), ref: 24102975
                                                                                                                                                                                                                      • Part of subcall function 24102908: gethostbyname.WS2_32(00000000), ref: 241029A2
                                                                                                                                                                                                                      • Part of subcall function 24102908: connect.WS2_32(00000002,00000002,00000010), ref: 241029CD
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,00000000,2411B027), ref: 2411AE54
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000001,00000000,2411AFAD,?,000003E8,2411B060,?,?,?,?,2411B060,2413B98C,2411B060,resposta,|Y|,2413B8DC), ref: 2411AF33
                                                                                                                                                                                                                      • Part of subcall function 24102CEC: send.WS2_32(?,00000000,00000000,00000000), ref: 24102CF8
                                                                                                                                                                                                                      • Part of subcall function 24102CEC: WSAGetLastError.WS2_32(00000000,?,24102D4C,?,?,24118FD9,24119060,24119054,?,00000000,?,00000000,24119016,?,?,00000000), ref: 24102D04
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep$getpeernamehtons$ErrorLastconnectgethostbynameinet_addrinet_ntoasendsocket
                                                                                                                                                                                                                    • String ID: resposta$|Y|
                                                                                                                                                                                                                    • API String ID: 3039588340-3743483372
                                                                                                                                                                                                                    • Opcode ID: d8059ce728f18c91712550a2f3597c32bb96a7b730f4831530d9e41a728b8d3b
                                                                                                                                                                                                                    • Instruction ID: bc5ba9f2acab84a8b193f4253df8eb39e24d0c7ec1731f0c4d4402b629e8cdf6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d8059ce728f18c91712550a2f3597c32bb96a7b730f4831530d9e41a728b8d3b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AD517E70A002199FEB11DF65CCC0ACDBBB5FF99344F4184B5E448AA298DB34AF918B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24102A38: shutdown.WS2_32(?,00000002), ref: 24102A83
                                                                                                                                                                                                                      • Part of subcall function 24102A38: closesocket.WS2_32(?), ref: 24102AB1
                                                                                                                                                                                                                    • socket.WS2_32(00000002,00000001,00000006), ref: 24102959
                                                                                                                                                                                                                    • htons.WS2_32(?), ref: 24102968
                                                                                                                                                                                                                    • inet_addr.WS2_32(00000000), ref: 24102975
                                                                                                                                                                                                                    • gethostbyname.WS2_32(00000000), ref: 241029A2
                                                                                                                                                                                                                    • connect.WS2_32(00000002,00000002,00000010), ref: 241029CD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: closesocketconnectgethostbynamehtonsinet_addrshutdownsocket
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1626636048-0
                                                                                                                                                                                                                    • Opcode ID: 7fae2a1c8b1106020e3576fbb04a0c52f70fd469eafc3dc536fd010da5b444a3
                                                                                                                                                                                                                    • Instruction ID: 9cb9abfafff7c17c54066bbc51c1ff144407a18406ce530d3aedba5ded8c5764
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7fae2a1c8b1106020e3576fbb04a0c52f70fd469eafc3dc536fd010da5b444a3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5231AF30604344DFEB19CF64DCA0A6ABBE8EB09310B5298A5EC04DF655E774DE10DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenClipboard.USER32(00000000), ref: 2411CE11
                                                                                                                                                                                                                    • GetClipboardData.USER32(0000000F), ref: 2411CE26
                                                                                                                                                                                                                    • DragQueryFile.SHELL32(00000000,000000FF,00000000,00000000), ref: 2411CE38
                                                                                                                                                                                                                    • DragQueryFile.SHELL32(00000000,00000000,00000000,00000105), ref: 2411CE6B
                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 2411CEB6
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Clipboard$DragFileQuery$CloseDataOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3062564445-0
                                                                                                                                                                                                                    • Opcode ID: 326f68bae02ee6de6795abc8569cd418972459aff74613e19d3ce650772ecc3f
                                                                                                                                                                                                                    • Instruction ID: 68c40cdb43536765418632fed7ffaeeee8f2ce2f1042c3bfe20a591cb0c046d2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 326f68bae02ee6de6795abc8569cd418972459aff74613e19d3ce650772ecc3f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 102120306046587FF72197688CD1FDF7EB9DB59B54F4200F4E508A2285FAB54A409A61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000,24135EB7), ref: 24135E37
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(001F0FFF,00000000,?,00000000,24135EB7), ref: 24135E50
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,001F0FFF,00000000,?,00000000,24135EB7), ref: 24135E78
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,001F0FFF,00000000,?,00000000,24135EB7), ref: 24135E8B
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064,00000000,00000000,001F0FFF,00000000,?,00000000,24135EB7), ref: 24135E92
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseHandleProcess$CurrentOpenSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4261582699-0
                                                                                                                                                                                                                    • Opcode ID: 7923038193c7d8631632e64b127d7b40788c70ba7d58118d1f3845ebb11f2c13
                                                                                                                                                                                                                    • Instruction ID: 7d4c2e9da77aaec62133d0b964530c559a7bc2614d286d03e052a6e871724c10
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7923038193c7d8631632e64b127d7b40788c70ba7d58118d1f3845ebb11f2c13
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3111C4307006056BE3109B79CCC0A8FFBEDAF65A14F920570A804E7649EF74FE8687A4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 24102908: socket.WS2_32(00000002,00000001,00000006), ref: 24102959
                                                                                                                                                                                                                      • Part of subcall function 24102908: htons.WS2_32(?), ref: 24102968
                                                                                                                                                                                                                      • Part of subcall function 24102908: inet_addr.WS2_32(00000000), ref: 24102975
                                                                                                                                                                                                                      • Part of subcall function 24102908: gethostbyname.WS2_32(00000000), ref: 241029A2
                                                                                                                                                                                                                      • Part of subcall function 24102908: connect.WS2_32(00000002,00000002,00000010), ref: 241029CD
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,00000000,24117E17,?,?,?,?,00000000,00000000), ref: 24117D73
                                                                                                                                                                                                                    • Sleep.KERNEL32(000003E8,0000000A,00000000,24117E17,?,?,?,?,00000000,00000000), ref: 24117DBD
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000EA60,000003E8,0000000A,00000000,24117E17,?,?,?,?,00000000,00000000), ref: 24117DF5
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Sleep$connectgethostbynamehtonsinet_addrsocket
                                                                                                                                                                                                                    • String ID: resposta$|Y|
                                                                                                                                                                                                                    • API String ID: 1101491793-3743483372
                                                                                                                                                                                                                    • Opcode ID: 5050fdb0eb540220ded3bf061d0cfe60bf4046690208fd17ee434c43d72c2c04
                                                                                                                                                                                                                    • Instruction ID: 6389e2aabaf570ed10801ed46322fe098e602502855f099894802bf4f6ca0d7f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5050fdb0eb540220ded3bf061d0cfe60bf4046690208fd17ee434c43d72c2c04
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F111C131304708BFE7119B66CCE1F1EBBA9EB59708F124435F908B6748E978AE908A51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyA.ADVAPI32(?,00000000,?), ref: 2410C022
                                                                                                                                                                                                                    • RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2410C039
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,?,00000000,2410C081), ref: 2410C051
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,2410C081), ref: 2410C05A
                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 2410C061
                                                                                                                                                                                                                      • Part of subcall function 2410BDD4: RegEnumValueA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2410BF43,?,00000000,2410BF60), ref: 2410BE4E
                                                                                                                                                                                                                      • Part of subcall function 2410BDD4: RegSetValueExA.ADVAPI32(?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000,00000000,2410BF43), ref: 2410BE74
                                                                                                                                                                                                                      • Part of subcall function 2410BDD4: RegDeleteValueA.ADVAPI32(?,00000000,?,00000000,00000000,?,?,00002000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2410BE85
                                                                                                                                                                                                                      • Part of subcall function 2410BDD4: RegEnumKeyExA.ADVAPI32(?,00000000,00000000,00000200,00000000,?,00002000,00000000,?,00000000,00000000,00000200,00000000,?,?,00002000), ref: 2410BEB9
                                                                                                                                                                                                                      • Part of subcall function 2410BDD4: RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 2410BED5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$CloseCreateDeleteEnum$Open
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3917402359-0
                                                                                                                                                                                                                    • Opcode ID: f20c292c29519b0b7fa60001a7cd78a1e1ba38f941514fbdea19f4a41a534d15
                                                                                                                                                                                                                    • Instruction ID: d1eccac7becc5d59312521a0b3d9e994984fbf0ad6e28d896c254cccb38ec42a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f20c292c29519b0b7fa60001a7cd78a1e1ba38f941514fbdea19f4a41a534d15
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E01112B5900208BFEB11DBA5DD80D9FB7FDEF58254B525575B814D3208EA38EE44CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,2411C9CF), ref: 2411C97B
                                                                                                                                                                                                                    • OpenServiceA.ADVAPI32(00000000,00000000,00010000,00000000,00000000,000F003F,00000000,2411C9CF), ref: 2411C995
                                                                                                                                                                                                                    • DeleteService.ADVAPI32(00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,2411C9CF), ref: 2411C9A1
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,2411C9CF), ref: 2411C9AE
                                                                                                                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,2411C9CF), ref: 2411C9B4
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Service$CloseHandleOpen$DeleteManager
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 204194956-0
                                                                                                                                                                                                                    • Opcode ID: 99557236cc6420885ecb78406d02a6caef7aadc1629097a31dce3623d0e6a68f
                                                                                                                                                                                                                    • Instruction ID: eeeb2cb1c1ae1165ce4ffe8f25f8694807128e0b06da2ecf0f828f1e40307936
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 99557236cc6420885ecb78406d02a6caef7aadc1629097a31dce3623d0e6a68f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4C01F4B06007087AF712DB358CD1FAF769CDF65A50F420471B908A6288FEB49F00F4A4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(00000000,2410E8B6,?,?,?,?,00000010,00000000,00000000), ref: 2410E51E
                                                                                                                                                                                                                      • Part of subcall function 2410DD70: WSAStartup.WS2_32(00000101,?), ref: 2410DDB0
                                                                                                                                                                                                                      • Part of subcall function 2410DD70: inet_addr.WS2_32(00000000), ref: 2410DDCF
                                                                                                                                                                                                                      • Part of subcall function 2410DD70: WSACleanup.WS2_32 ref: 2410DDDD
                                                                                                                                                                                                                      • Part of subcall function 2410DD70: gethostbyaddr.WS2_32(000000FF,00000004,00000002), ref: 2410DDF1
                                                                                                                                                                                                                      • Part of subcall function 2410DD70: WSACleanup.WS2_32 ref: 2410DE12
                                                                                                                                                                                                                      • Part of subcall function 240F3790: SysFreeString.OLEAUT32(?), ref: 240F37A3
                                                                                                                                                                                                                      • Part of subcall function 240F3778: SysFreeString.OLEAUT32(?), ref: 240F3786
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CleanupFreeString$CurrentProcessStartupgethostbyaddrinet_addr
                                                                                                                                                                                                                    • String ID: TCP$UDP$Unknown
                                                                                                                                                                                                                    • API String ID: 3668935989-2456960297
                                                                                                                                                                                                                    • Opcode ID: c45f4b49acf9eff77db4d8063fe71a3b6001112f1437c166c17d051cca57fb84
                                                                                                                                                                                                                    • Instruction ID: 17f1da4666d72fc50c1bff7315648c01946c52e51ace6766a757d4fe35ae1133
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c45f4b49acf9eff77db4d8063fe71a3b6001112f1437c166c17d051cca57fb84
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72B1287091420DABEB10DB96CCC0ADEBBBAFF54314F119576E900B7218DA75AE86CF50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • WNetOpenEnumA.MPR(00000002,00000000,00000000,?,?), ref: 2412074D
                                                                                                                                                                                                                    • WNetEnumResourceA.MPR(?,FFFFFFFF,?,00004020), ref: 24120890
                                                                                                                                                                                                                    • WNetCloseEnum.MPR(?), ref: 241208AE
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Enum$CloseOpenResource
                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                    • API String ID: 1269649575-2726393805
                                                                                                                                                                                                                    • Opcode ID: 2e2f40a4f191adc06d821f79182eeaadf54b7754ef090dca3d23d66ae8cb8091
                                                                                                                                                                                                                    • Instruction ID: a91f98dc169279402d5922bb83c58ba6a25d72dc1c3d2dd5d8b6e411c40ead21
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2e2f40a4f191adc06d821f79182eeaadf54b7754ef090dca3d23d66ae8cb8091
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BD4181B1D40A28ABEB11CF55CCC0B8ABFB9FB54314F5242E5EB04F624DDA749B408E94
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowTextA.USER32(?,00000000,00000000), ref: 24122A8E
                                                                                                                                                                                                                    • IsWindowVisible.USER32(?), ref: 24122A9E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$TextVisible
                                                                                                                                                                                                                    • String ID: *@*@
                                                                                                                                                                                                                    • API String ID: 1670992164-2280034366
                                                                                                                                                                                                                    • Opcode ID: 760ad0d0c04e71c23185a12b6151988ab76eddb5a8ba8d1f1d6682463a33e06f
                                                                                                                                                                                                                    • Instruction ID: 8a6348c73891afedc6aefd1bf2d0b994a808ee4083e8646cc47859fd1feac1fc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 760ad0d0c04e71c23185a12b6151988ab76eddb5a8ba8d1f1d6682463a33e06f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A821D170A00508BFEB15DEA0DCD1FAEBB69EB54304FA240B1B500FA549DA75DF448A18
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExA.KERNEL32(24143704), ref: 241336E3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Version
                                                                                                                                                                                                                    • String ID: \Device\PhysicalMemory
                                                                                                                                                                                                                    • API String ID: 1889659487-2007344781
                                                                                                                                                                                                                    • Opcode ID: 992b73057bf1bc6c4dd5bcdf606e47d40729b299bc0a2e722d09e44970f93001
                                                                                                                                                                                                                    • Instruction ID: 709dafd845588567b884403b8878ad452c841fe339f22e7982c09e414f50182d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 992b73057bf1bc6c4dd5bcdf606e47d40729b299bc0a2e722d09e44970f93001
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7215EB6708209AFD340CF75CDC8F4A7EE5E788285F114C29F549D6680E7B8D6848B15
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 240F15E0: GetModuleFileNameA.KERNEL32(00000000,?,00000105,?,?,2413B97C,24134C34,00000000,24134C9D,?,?,00000000,00000000), ref: 240F1604
                                                                                                                                                                                                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 2411B439
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 2411B43F
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000,2411B4AE), ref: 2411B44F
                                                                                                                                                                                                                      • Part of subcall function 2411B308: VirtualAllocEx.KERNEL32(00000000,00000000,00000000,00003000,00000040), ref: 2411B320
                                                                                                                                                                                                                      • Part of subcall function 2411B308: VirtualProtectEx.KERNEL32(00000000,00000000,00000000,00000040,00000040,00000000,00000000,00000000,00003000,00000040), ref: 2411B331
                                                                                                                                                                                                                      • Part of subcall function 2411B308: WriteProcessMemory.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000040,00000040,00000000,00000000,00000000,00003000,00000040), ref: 2411B33F
                                                                                                                                                                                                                      • Part of subcall function 2411B354: GetModuleHandleA.KERNEL32(00000000), ref: 2411B36C
                                                                                                                                                                                                                      • Part of subcall function 2411B354: VirtualFreeEx.KERNEL32(00000000,?,00000000,00008000,?,00000000), ref: 2411B396
                                                                                                                                                                                                                      • Part of subcall function 2411B354: VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 2411B3A5
                                                                                                                                                                                                                      • Part of subcall function 2411B354: GetModuleHandleA.KERNEL32(00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 2411B3B8
                                                                                                                                                                                                                      • Part of subcall function 2411B354: WriteProcessMemory.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 2411B3C0
                                                                                                                                                                                                                      • Part of subcall function 2411B354: CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000), ref: 2411B3E1
                                                                                                                                                                                                                      • Part of subcall function 2411B354: CloseHandle.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 2411B3E7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ProcessVirtual$HandleModule$AllocMemoryThreadWindowWrite$CloseCreateFileFindFreeNameOpenProtectRemote
                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                    • API String ID: 1977168033-2988720461
                                                                                                                                                                                                                    • Opcode ID: 03a7260d88b046805293d1054fe5de511928ebd80afcf7569e7430b3f68e95e8
                                                                                                                                                                                                                    • Instruction ID: 2cd9d146f3f825f28fbbeb0437dce0bc45982ddd05282bb61fe5af92856b7b06
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 03a7260d88b046805293d1054fe5de511928ebd80afcf7569e7430b3f68e95e8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E611CA71B002086FEB40DBB8CCD0A9EB7E9EF48210F524535E515E7348EE78EE048B54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(urlmon.dll,URLDownloadToFileA,00000000,240F6200,?,?,?,00000000,?,2411862A,00000000,00000000,00000000,2411867F,?,.tmp), ref: 240F61CD
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,urlmon.dll), ref: 240F61D3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: URLDownloadToFileA$urlmon.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-892269089
                                                                                                                                                                                                                    • Opcode ID: 3d6d03a3e4aaf58d04fb40c9e047b8c6686512c9d4b34fece13cb1c5aa88eea8
                                                                                                                                                                                                                    • Instruction ID: b3a979267c4442ce197c571bd92ce809fe0f743666d2954628414ec1d4547f77
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d6d03a3e4aaf58d04fb40c9e047b8c6686512c9d4b34fece13cb1c5aa88eea8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3FF09075604A04BFA710CBE6CC90D5E7BECEF8D6103538874B804D3218DE34AE418AA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(KERNEL32.DLL,GetProductInfo,00000000,24100BD9), ref: 24100B9B
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,KERNEL32.DLL), ref: 24100BA1
                                                                                                                                                                                                                      • Part of subcall function 240FF870: GetVersionExW.KERNEL32(0000011C), ref: 240FF8DA
                                                                                                                                                                                                                      • Part of subcall function 240FF870: GetVersionExW.KERNEL32(00000094,0000011C), ref: 240FF8F6
                                                                                                                                                                                                                      • Part of subcall function 240FF870: GetSystemInfo.KERNEL32(?,0000011C), ref: 240FF95C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Version$AddressHandleInfoModuleProcSystem
                                                                                                                                                                                                                    • String ID: GetProductInfo$KERNEL32.DLL
                                                                                                                                                                                                                    • API String ID: 335284197-4189171773
                                                                                                                                                                                                                    • Opcode ID: 7b4d04bb2933842433bf66461d93572b7c1d8d4216938ce4bc849cc679d2ee19
                                                                                                                                                                                                                    • Instruction ID: 8c7679b6e2f65de714661a65c9efb6237de77d71b592c2d862c5df37c479c4bb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b4d04bb2933842433bf66461d93572b7c1d8d4216938ce4bc849cc679d2ee19
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 83F096356142045F9711DF61DCE0C8E7BE8EB597287935132EC01B2658EE359D818DA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(AVICAP32.dll,capGetDriverDescriptionA), ref: 2410191A
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,AVICAP32.dll), ref: 24101920
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: AVICAP32.dll$capGetDriverDescriptionA
                                                                                                                                                                                                                    • API String ID: 2574300362-2465018903
                                                                                                                                                                                                                    • Opcode ID: 923c4ca97b63bed19ee6a7f4598ad5f35352d60679e31f00216a0024b30cf205
                                                                                                                                                                                                                    • Instruction ID: be3fe581dcf446c700e424f9da186c87d8f208ab8b4cc01554f5f7bcb56128bd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 923c4ca97b63bed19ee6a7f4598ad5f35352d60679e31f00216a0024b30cf205
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30D012762045143B6720A5DB9CC4D9BBB5CDEE5575312D126B9089310AD8759D0587F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageA.USER32(?,0000040B,00000000,00000000), ref: 2411B65D
                                                                                                                                                                                                                    • UnregisterClassA.USER32(MainForm,?), ref: 2411B674
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassMessageSendUnregister
                                                                                                                                                                                                                    • String ID: MainForm$Video
                                                                                                                                                                                                                    • API String ID: 3339218838-2964836702
                                                                                                                                                                                                                    • Opcode ID: bde51fac205a959067ae6d615af25686e7a712586f0b1b47f21e87b9bee9744c
                                                                                                                                                                                                                    • Instruction ID: 5b2adb21908d63c5346446f8296a40cf847345e4c64dba7030c95f818ccd1233
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bde51fac205a959067ae6d615af25686e7a712586f0b1b47f21e87b9bee9744c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2CE09AB27803407BF650DB6A8C82F153AA4D754B14F524020F708BA5C4F5B476908F18
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetSystemDirectoryA,?,?,240F6F52,00000000,240F6F93), ref: 240F6E58
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 240F6E5E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: GetSystemDirectoryA$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-261809815
                                                                                                                                                                                                                    • Opcode ID: 8e3c5bf4f21989bd2679ca569eed970311a9c8b17c9951c1c28e5836e9ef04de
                                                                                                                                                                                                                    • Instruction ID: 3933b5585c8e4387a91c6303d44fd40ea84175658bc6987338b780a941d86627
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e3c5bf4f21989bd2679ca569eed970311a9c8b17c9951c1c28e5836e9ef04de
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 12C09B936516203B773075F6DCD4D9F454CCE754673030871B915E314BDD564D8505F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetWindowsDirectoryA,?,?,240F6FDE,00000000,240F701F,?,?,?,240F7083,?,00000000,240F70AB,?,00000000), ref: 240F6EA0
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 240F6EA6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: GetWindowsDirectoryA$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-157430550
                                                                                                                                                                                                                    • Opcode ID: 1799f65bf402dd11a46f98e7382fb403c3ec7bc44e438658788134b01c1581c7
                                                                                                                                                                                                                    • Instruction ID: a2b25f4dd6b6e14ae3e5275cba677e863393416088eb04899637a398183ca9f3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1799f65bf402dd11a46f98e7382fb403c3ec7bc44e438658788134b01c1581c7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 74C09B93541A203B773076F69CD4D9F454CCDA546B30308717D14E210E9D554D8945F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetTempPathA,?,?,240F704D,?,24118525,00000000,24118DD5,?,?,?,?,0000000B,00000000,00000000), ref: 240F6EEC
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 240F6EF2
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: GetTempPathA$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-3269217876
                                                                                                                                                                                                                    • Opcode ID: 68a924575e68bf557c481814eed861a11145bb5aec1a692e6b18e634632282a6
                                                                                                                                                                                                                    • Instruction ID: ef01eba50549746e78e504e0bdfbff2d2ec6c585ba901ee07059cc5bb4a0799b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 68a924575e68bf557c481814eed861a11145bb5aec1a692e6b18e634632282a6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A3C09B915456203B773065F65CD4E9F454CDE654A77130C717914E210FDC545D8915F4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(ntdll.dll,ZwUnmapViewOfSection,?,00000000,24134A7E,?,?,?,00000004,?,?,00010002), ref: 2413494C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,ntdll.dll), ref: 24134952
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: ZwUnmapViewOfSection$ntdll.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-452462277
                                                                                                                                                                                                                    • Opcode ID: 5361bf6e8c37b2124288b457131ace43eacffa2b20801686c577f034760a0f7a
                                                                                                                                                                                                                    • Instruction ID: babda2a78de179b0fe65e9a5f13c489be3a5cada94efd8b87b063a605d61180c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5361bf6e8c37b2124288b457131ace43eacffa2b20801686c577f034760a0f7a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1BC04C916416243A6630E5FA5CD5E9B594C8DA907A30304617914E210A99585D4446F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(shell32.dll,SHFileOperationA), ref: 240F5E8D
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 240F5E93
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                                                                                                                    • String ID: SHFileOperationA$shell32.dll
                                                                                                                                                                                                                    • API String ID: 2574300362-1445012119
                                                                                                                                                                                                                    • Opcode ID: 04eb4ba3e7a2be5fe124bd427f8afc22954089021653e967de022679f8b34e53
                                                                                                                                                                                                                    • Instruction ID: 15358971611d1af0d0a0b349a06618a6fb9606482aa7874c40b3fc6eba75c049
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 04eb4ba3e7a2be5fe124bd427f8afc22954089021653e967de022679f8b34e53
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 08B092A0141A113E673426F28CD0E1E004D5EA400738304303800E100B8D285A880460
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(000001F4,00000000,24122867,?,?,?,?,00000000,00000000), ref: 24122777
                                                                                                                                                                                                                    • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000013,2412288C,2412288C,2412288C,24122880,?,000001F4,00000000,24122867), ref: 24122814
                                                                                                                                                                                                                    • GetForegroundWindow.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000013,2412288C,2412288C,2412288C,24122880,?,000001F4,00000000,24122867), ref: 24122819
                                                                                                                                                                                                                    • SetForegroundWindow.USER32(?), ref: 24122828
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Foreground$Sleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1564942233-0
                                                                                                                                                                                                                    • Opcode ID: 759706081a733db9b3e9303fb426d359f96beb565d5d0774a169d44cf1ed0b17
                                                                                                                                                                                                                    • Instruction ID: a2eae39c19139ae7dc5058db030bbf263f187e89c05e5cb86e0fb53d2edd0613
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 759706081a733db9b3e9303fb426d359f96beb565d5d0774a169d44cf1ed0b17
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AA21A130740619AFF715DB55DCD0F8D7BE4EB19310F6201A1F604AB6A8CBB4EA41CB55
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00000001,?,00000000,2411D228), ref: 2411D194
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,?,00000000,2411D228), ref: 2411D1B8
                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001), ref: 2411D1E2
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000), ref: 2411D1FC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: QueryValue$CloseOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1586453840-0
                                                                                                                                                                                                                    • Opcode ID: f59ecaf1b3f1c5caf6da81aaee94a3b1ecc25af142968281546b601553d7f663
                                                                                                                                                                                                                    • Instruction ID: ce05d9b22eb31817258225f969daaeb6450e073f34a1f414b01b662d0be6c6f5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f59ecaf1b3f1c5caf6da81aaee94a3b1ecc25af142968281546b601553d7f663
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 52212C75A00148AFEB00DBA9DC81EAFF7FDEF98654F520475B504E7244DE78AE408B61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 241043BC
                                                                                                                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 241043E5
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 241043EF
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000,00000000,?), ref: 241043F5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Free$Heap$LibraryProcessVirtual
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 548792435-0
                                                                                                                                                                                                                    • Opcode ID: 327151f7bebc56f7355ee985beca54bda8cd7dd0ae24fdd1ad7be8b3eac1ed1b
                                                                                                                                                                                                                    • Instruction ID: e9c6f4b854e4756b62e3a2d7325f563c1afbb5d0d0b30b740febde78f5f5ca2b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 327151f7bebc56f7355ee985beca54bda8cd7dd0ae24fdd1ad7be8b3eac1ed1b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 471184716042149FEB10CF69CCC1B4AB7A8EF54324F259195ED18DF296DB70EE50CBA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClassInfoA.USER32(240F0000,241215A0,?), ref: 241216A5
                                                                                                                                                                                                                    • UnregisterClassA.USER32(241215A0,240F0000), ref: 241216CE
                                                                                                                                                                                                                    • RegisterClassA.USER32(2413AA5C), ref: 241216D8
                                                                                                                                                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 24121723
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4025006896-0
                                                                                                                                                                                                                    • Opcode ID: bd81dc49f60972dda91baca62fa1c10a1bbbd514d1edd948e7f79f57cabb769c
                                                                                                                                                                                                                    • Instruction ID: 5dad8c7099cfacaf5e87ae1c0080b16b0d28f40b774dd58ac7a6c8cc4f2af081
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bd81dc49f60972dda91baca62fa1c10a1bbbd514d1edd948e7f79f57cabb769c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8401DBB2700614ABDB10EAA9CCC0F9E7F9CF719104F514320F514F72C6EA76DA408750
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClassInfoA.USER32(240F0000,24133AB0,?), ref: 24133BA1
                                                                                                                                                                                                                    • UnregisterClassA.USER32(24133AB0,240F0000), ref: 24133BCA
                                                                                                                                                                                                                    • RegisterClassA.USER32(2413AAC4), ref: 24133BD4
                                                                                                                                                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 24133C1F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4025006896-0
                                                                                                                                                                                                                    • Opcode ID: 60b2ebdd4dedda600b790eee50decdd6cf240ef99aae791e27aeab5058e58d06
                                                                                                                                                                                                                    • Instruction ID: cad3e4576a5777f7cdbda470dd2b2add2870a1ea64faa7cacf28e1f769d49e6b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 60b2ebdd4dedda600b790eee50decdd6cf240ef99aae791e27aeab5058e58d06
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 51019BB2700204ABDB10EAA9CCC1F9E7F9CE75C115F114351F618F72C6EA75D9408794
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindNextFileA.KERNEL32(?,?), ref: 240F5E08
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?), ref: 240F5E11
                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?), ref: 240F5E25
                                                                                                                                                                                                                    • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 240F5E34
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileTime$DateErrorFindLastLocalNext
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2103556486-0
                                                                                                                                                                                                                    • Opcode ID: 279fd369aea94373d2c4810311f26676bf52d26d4f3dd90bf34f948f5bf4a313
                                                                                                                                                                                                                    • Instruction ID: 6dcab7d4d7eea1fc2c8297bf330abde5642eae9d01ca730f6c6de37c62bed0df
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 279fd369aea94373d2c4810311f26676bf52d26d4f3dd90bf34f948f5bf4a313
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F2F031762042009FDB44CFA4CCC1C8B33ECAF5821470645B2AD18CF24EEA34E594CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 240F5AD7
                                                                                                                                                                                                                    • TranslateMessage.USER32 ref: 240F5AE9
                                                                                                                                                                                                                    • DispatchMessageA.USER32 ref: 240F5AEF
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000001,?,00000000,00000000,00000000,00000001,?,00000000,240F5B0A), ref: 240F5AF6
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message$DispatchPeekSleepTranslate
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3768732053-0
                                                                                                                                                                                                                    • Opcode ID: 3dee2935046c145a20310657923f066b4c1650418999a03fa847e1f3cf1e7d93
                                                                                                                                                                                                                    • Instruction ID: 189187c9d97b81bc8e49ffec4a9cc332852c60682371e595b3dd377a29b0cd38
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3dee2935046c145a20310657923f066b4c1650418999a03fa847e1f3cf1e7d93
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 01E0123138372039F73056A40C81F9E55C84F2264EF534135B2016A0C6CEC5698041A9
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GlobalHandle.KERNEL32 ref: 240F548F
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 240F5496
                                                                                                                                                                                                                    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 240F549B
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 240F54A1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Global$AllocHandleLockUnlock
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2167344118-0
                                                                                                                                                                                                                    • Opcode ID: 505157e451beb4b904f6f62bc6a33cc31f1955a287db27c020f03c767c2bc075
                                                                                                                                                                                                                    • Instruction ID: 760b1d66a9600ed246e36338de1036906f327c1ae28052553bfb8e50e61488f5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 505157e451beb4b904f6f62bc6a33cc31f1955a287db27c020f03c767c2bc075
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3AB002C49906043DBB342BF45C19D3F045C9FB450A78749743C00D200ADC689C9840B5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountTick
                                                                                                                                                                                                                    • String ID: *.*$.tmp
                                                                                                                                                                                                                    • API String ID: 536389180-2468557045
                                                                                                                                                                                                                    • Opcode ID: c592e23dd23208e9b1fa803cc722a6cd88a8ca390ce7d95b9a7db82204ca3e2b
                                                                                                                                                                                                                    • Instruction ID: 96643a18eb715c37bc83f665c22407245a58cecbc927331d2bae7c01d21e16c0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c592e23dd23208e9b1fa803cc722a6cd88a8ca390ce7d95b9a7db82204ca3e2b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6C716B30A0462CAFEB11CF61CC90ADEBBB9EB59314F9281F5D808E2254DE759F85CE50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountTick
                                                                                                                                                                                                                    • String ID: *.*$.tmp
                                                                                                                                                                                                                    • API String ID: 536389180-2468557045
                                                                                                                                                                                                                    • Opcode ID: 63d52e6fe477d4d3b0e5e5b4fef0a76f2ae6bd8e1314016d46a18282695258dc
                                                                                                                                                                                                                    • Instruction ID: d4121f95a71cfca49ef88ed1494bfaf7db208c9da68a27eb54aedf39b7482917
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 63d52e6fe477d4d3b0e5e5b4fef0a76f2ae6bd8e1314016d46a18282695258dc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC515F30A08A5C9FEB25CB70DC90ADEBBB5EB54314F9240F59808E2254DF759F85CE50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindow.USER32 ref: 2412024A
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,FFFFFFFF), ref: 24120263
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ProcessThread
                                                                                                                                                                                                                    • String ID: #|#
                                                                                                                                                                                                                    • API String ID: 3635926707-3836175907
                                                                                                                                                                                                                    • Opcode ID: d4c0c905e9ee50ce995b8dac4a3562bc58a5ec78e13d99ac7c80253221852852
                                                                                                                                                                                                                    • Instruction ID: 39fcb2ee464125acb6a8ccda19681892865138feaa69f670138fc97903511bc3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d4c0c905e9ee50ce995b8dac4a3562bc58a5ec78e13d99ac7c80253221852852
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3531C470604508AFFB05DBA4CD909AFBBBDEB98314F524276E900E3748EE74EF458960
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00004000,?,00000000,?,00000000,?,?,24103F92,?,?,00004550,00004550,?,00000000), ref: 24103D26
                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,00000000,00000000,?,?,?,00000000,?,00000000,?,?,24103F92,?,?,00004550,00004550), ref: 24103D80
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • FinalizeSections: VirtualProtect failed, xrefs: 24103D8E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$FreeProtect
                                                                                                                                                                                                                    • String ID: FinalizeSections: VirtualProtect failed
                                                                                                                                                                                                                    • API String ID: 2581862158-3584865983
                                                                                                                                                                                                                    • Opcode ID: 48f97ceb7ab0abb48088ae0c2970b1d0370b178ebcfb0e24eed38587f7c47017
                                                                                                                                                                                                                    • Instruction ID: e0ae39f0c3013b6cec754fbc2534d14236b637014591e2b1153fd5b8b660b29e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 48f97ceb7ab0abb48088ae0c2970b1d0370b178ebcfb0e24eed38587f7c47017
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F215E72708208AFE710CF59C9C4F867BE9AF59694F429191FE48DF35AD6B0EE408750
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 24117A4F
                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,.bmp,?,00000000,00000000,?,00000000,00000000,00000000,24117AB6), ref: 24117A7C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountDeleteFileTick
                                                                                                                                                                                                                    • String ID: .bmp
                                                                                                                                                                                                                    • API String ID: 3334397753-2863430793
                                                                                                                                                                                                                    • Opcode ID: cbb12b75e087a94b73b8d654df7d40483b7cb335676ef8f0854db625440f8549
                                                                                                                                                                                                                    • Instruction ID: f8b221e5f2241f919ffb2bb42b02699255a8a8d9663ffbb2a027686e299464b0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cbb12b75e087a94b73b8d654df7d40483b7cb335676ef8f0854db625440f8549
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72119030A00108AFEB00DFA8DC90A9EB7B9EF58304F5244B6E818E7358DF74AF458A50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ioctlsocket.WS2_32(?,4004667F), ref: 24102C0D
                                                                                                                                                                                                                      • Part of subcall function 24102A38: shutdown.WS2_32(?,00000002), ref: 24102A83
                                                                                                                                                                                                                      • Part of subcall function 24102A38: closesocket.WS2_32(?), ref: 24102AB1
                                                                                                                                                                                                                    • WSAGetLastError.WS2_32(?,00000000,?,00000000,?,?,00000000,?,24102CBD,?,?,2411964C,00000000,2411A33B), ref: 24102C52
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 0000000A.00000002.2519483566.00000000240F0000.00000040.00000400.00020000.00000000.sdmp, Offset: 240F0000, based on PE: true
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.0000000024144000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 0000000A.00000002.2519483566.000000002414B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_10_2_240f0000_3ClBcOpPUX.jbxd
                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLastclosesocketioctlsocketshutdown
                                                                                                                                                                                                                    • String ID: 3'
                                                                                                                                                                                                                    • API String ID: 3350378930-280543908
                                                                                                                                                                                                                    • Opcode ID: 67953cbbeb681437e6c178f8ece78b732fd211c46b4f13365584b73cdd77e0fc
                                                                                                                                                                                                                    • Instruction ID: b1d36972e4a55a15029397ec120f63a8763fedd73b554cec310f5e8a6c6c0622
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 67953cbbeb681437e6c178f8ece78b732fd211c46b4f13365584b73cdd77e0fc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D001B1742086009BD31C6A388EC4ABB7698AB55370F11EA68B9E49F295D634CF418751