Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rYhL.exe

Overview

General Information

Sample name:rYhL.exe
Analysis ID:1501601
MD5:ca4ccb77c304e8074abd359dd086ede4
SHA1:4a17bc625d34ccde78a62db109877f8e9d808d70
SHA256:f127eced7a835fecf3453bcb307040fb4e91bfc0c63983d2a8d6c0dd72a4e5c1
Tags:exeRemcosRAT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • rYhL.exe (PID: 6196 cmdline: "C:\Users\user\Desktop\rYhL.exe" MD5: CA4CCB77C304E8074ABD359DD086EDE4)
    • rYhL.exe (PID: 5884 cmdline: "C:\Users\user\Desktop\rYhL.exe" MD5: CA4CCB77C304E8074ABD359DD086EDE4)
      • rYhL.exe (PID: 4284 cmdline: C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh" MD5: CA4CCB77C304E8074ABD359DD086EDE4)
      • rYhL.exe (PID: 4308 cmdline: C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh" MD5: CA4CCB77C304E8074ABD359DD086EDE4)
      • rYhL.exe (PID: 1716 cmdline: C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ybvkuknlzmitkiyc" MD5: CA4CCB77C304E8074ABD359DD086EDE4)
      • rYhL.exe (PID: 3852 cmdline: C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\idaducgmvuafupugdysz" MD5: CA4CCB77C304E8074ABD359DD086EDE4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "127.0.0.1:2404:167.207.161.204:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ZA03K9", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6c4b8:$a1: Remcos restarted by watchdog!
          • 0x6ca30:$a3: %02i:%02i:%02i:%03i
          Click to see the 17 entries
          SourceRuleDescriptionAuthorStrings
          0.2.rYhL.exe.43e9970.2.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            0.2.rYhL.exe.43e9970.2.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0.2.rYhL.exe.43e9970.2.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                0.2.rYhL.exe.43e9970.2.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x690b8:$a1: Remcos restarted by watchdog!
                • 0x69630:$a3: %02i:%02i:%02i:%03i
                0.2.rYhL.exe.43e9970.2.unpackREMCOS_RAT_variantsunknownunknown
                • 0x6310c:$str_a1: C:\Windows\System32\cmd.exe
                • 0x63088:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x63088:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x63588:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x63db8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x6317c:$str_b2: Executing file:
                • 0x641fc:$str_b3: GetDirectListeningPort
                • 0x63ba8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x63d28:$str_b7: \update.vbs
                • 0x631a4:$str_b9: Downloaded file:
                • 0x63190:$str_b10: Downloading file:
                • 0x63234:$str_b12: Failed to upload file:
                • 0x641c4:$str_b13: StartForward
                • 0x641e4:$str_b14: StopForward
                • 0x63c80:$str_b15: fso.DeleteFile "
                • 0x63c14:$str_b16: On Error Resume Next
                • 0x63cb0:$str_b17: fso.DeleteFolder "
                • 0x63224:$str_b18: Uploaded file:
                • 0x631e4:$str_b19: Unable to delete:
                • 0x63c48:$str_b20: while fso.FileExists("
                • 0x636c1:$str_c0: [Firefox StoredLogins not found]
                Click to see the 34 entries

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: FC 3E AA F1 3D 99 67 FE 8D F9 4F ED 78 DA B3 43 31 17 35 37 42 BE FB 03 5C 32 C9 4E 8B 65 7A 6F 8E CF AF 9A 47 44 0C A4 A8 BF BC BF F0 DA 79 BF 78 52 39 09 F0 8D 70 C0 E7 A0 E0 81 98 F6 B1 19 CF BB , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\rYhL.exe, ProcessId: 5884, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-ZA03K9\exepath
                Timestamp:2024-08-30T07:24:01.556506+0200
                SID:2036594
                Severity:1
                Source Port:49709
                Destination Port:2404
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-08-30T07:24:00.199674+0200
                SID:2036594
                Severity:1
                Source Port:49708
                Destination Port:2404
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-08-30T07:24:01.578929+0200
                SID:2803304
                Severity:3
                Source Port:49710
                Destination Port:80
                Protocol:TCP
                Classtype:Unknown Traffic

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: rYhL.exeAvira: detected
                Source: 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "127.0.0.1:2404:167.207.161.204:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ZA03K9", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: rYhL.exeReversingLabs: Detection: 52%
                Source: rYhL.exeVirustotal: Detection: 55%Perma Link
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: rYhL.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_004338C8
                Source: rYhL.exe, 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_445c062c-4

                Exploits

                barindex
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00407538 _wcslen,CoGetObject,3_2_00407538
                Source: rYhL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: rYhL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_0040928E
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C322
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C388
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_004096A0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_00408847
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00407877 FindFirstFileW,FindNextFileW,3_2_00407877
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0044E8F9 FindFirstFileExA,3_2_0044E8F9
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB6B
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419B86
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD72
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_100010F1
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_10006580 FindFirstFileExA,3_2_10006580
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407CD2

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49709 -> 67.207.161.204:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49708 -> 67.207.161.204:2404
                Source: Malware configuration extractorURLs: 127.0.0.1
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 67.207.161.204:2404
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: AS-COLOAMUS AS-COLOAMUS
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49710 -> 178.237.33.50:80
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: unknownTCP traffic detected without corresponding DNS query: 67.207.161.204
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,3_2_0041B411
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: rYhL.exe, rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: rYhL.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
                Source: rYhL.exe, rYhL.exe, 00000003.00000002.4484224435.00000000015A3000.00000004.00000020.00020000.00000000.sdmp, rYhL.exe, 00000003.00000002.4484224435.0000000001581000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: rYhL.exe, 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, rYhL.exe, 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0:
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0H
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0I
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://ocsp.msocsp.com0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://ocsp.msocsp.com0S
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://ocspx.digicert.com0E
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://www.digicert.com/CPS0~
                Source: rYhL.exe, rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: rYhL.exe, rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: bhv6B90.tmp.5.drString found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696428304750
                Source: rYhL.exe, 00000005.00000002.2095139644.00000000014F4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                Source: rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?77686a33b2eafa1538ef78c3be5a5910
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?caa2cf97cacae25a18f577703684ee65
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7e9591e308dbda599df1fc08720a72a3
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?c6a2869c584d2ea23c67c44abe1ec326
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                Source: rYhL.exe, 00000005.00000002.2095074785.000000000116C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.li
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: rYhL.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-04-14-10-35/PreSignInSettingsConfig.json
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=4954a0
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                Source: rYhL.exe, rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: rYhL.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: bhv6B90.tmp.5.drString found in binary or memory: https://www.office.com/

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000003_2_0040A2F3
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B749
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004168FC
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,5_2_0040987A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004098E2
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_00406DFC
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,6_2_00406E9F
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_004068B5
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,7_2_004072B5
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B749
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,3_2_0040A41B
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTR

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTR

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041CA73 SystemParametersInfoW,3_2_0041CA73

                System Summary

                barindex
                Source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\Desktop\rYhL.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_0041812A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,3_2_0041330D
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,3_2_0041BBC6
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,3_2_0041BB9A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00401806 NtdllDefWindowProc_W,5_2_00401806
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_004018C0 NtdllDefWindowProc_W,5_2_004018C0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004016FD NtdllDefWindowProc_A,6_2_004016FD
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004017B7 NtdllDefWindowProc_A,6_2_004017B7
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00402CAC NtdllDefWindowProc_A,7_2_00402CAC
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00402D66 NtdllDefWindowProc_A,7_2_00402D66
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004167EF
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_075B11980_2_075B1198
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_075B1A700_2_075B1A70
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_079F23A80_2_079F23A8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_079F4BE80_2_079F4BE8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_079F53000_2_079F5300
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_07F760140_2_07F76014
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_092EFAC80_2_092EFAC8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_092E00240_2_092E0024
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_092E00400_2_092E0040
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_092EF2580_2_092EF258
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_092EF2550_2_092EF255
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_092EF6800_2_092EF680
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_092EF6900_2_092EF690
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043706A3_2_0043706A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004140053_2_00414005
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043E11C3_2_0043E11C
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004541D93_2_004541D9
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004381E83_2_004381E8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041F18B3_2_0041F18B
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004462703_2_00446270
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043E34B3_2_0043E34B
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004533AB3_2_004533AB
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0042742E3_2_0042742E
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004375663_2_00437566
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043E5A83_2_0043E5A8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004387F03_2_004387F0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043797E3_2_0043797E
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004339D73_2_004339D7
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0044DA493_2_0044DA49
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00427AD73_2_00427AD7
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041DBF33_2_0041DBF3
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00427C403_2_00427C40
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00437DB33_2_00437DB3
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00435EEB3_2_00435EEB
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043DEED3_2_0043DEED
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00426E9F3_2_00426E9F
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_100171943_2_10017194
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_1000B5C13_2_1000B5C1
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044B0405_2_0044B040
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0043610D5_2_0043610D
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_004473105_2_00447310
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044A4905_2_0044A490
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0040755A5_2_0040755A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0043C5605_2_0043C560
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044B6105_2_0044B610
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044D6C05_2_0044D6C0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_004476F05_2_004476F0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044B8705_2_0044B870
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044081D5_2_0044081D
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_004149575_2_00414957
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_004079EE5_2_004079EE
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00407AEB5_2_00407AEB
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044AA805_2_0044AA80
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00412AA95_2_00412AA9
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00404B745_2_00404B74
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00404B035_2_00404B03
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044BBD85_2_0044BBD8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00404BE55_2_00404BE5
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00404C765_2_00404C76
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00415CFE5_2_00415CFE
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00416D725_2_00416D72
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00446D305_2_00446D30
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00446D8B5_2_00446D8B
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00406E8F5_2_00406E8F
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004050386_2_00405038
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0041208C6_2_0041208C
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004050A96_2_004050A9
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0040511A6_2_0040511A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0043C13A6_2_0043C13A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004051AB6_2_004051AB
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004493006_2_00449300
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0040D3226_2_0040D322
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0044A4F06_2_0044A4F0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0043A5AB6_2_0043A5AB
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004136316_2_00413631
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004466906_2_00446690
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0044A7306_2_0044A730
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004398D86_2_004398D8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_004498E06_2_004498E0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0044A8866_2_0044A886
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0043DA096_2_0043DA09
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00438D5E6_2_00438D5E
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00449ED06_2_00449ED0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0041FE836_2_0041FE83
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00430F546_2_00430F54
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004050C27_2_004050C2
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004014AB7_2_004014AB
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004051337_2_00405133
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004051A47_2_004051A4
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004012467_2_00401246
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_0040CA467_2_0040CA46
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004052357_2_00405235
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004032C87_2_004032C8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004016897_2_00401689
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00402F607_2_00402F60
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00434801 appears 41 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00434E70 appears 54 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00402093 appears 50 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00401E65 appears 35 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Users\user\Desktop\rYhL.exeCode function: String function: 00416760 appears 69 times
                Source: rYhL.exe, 00000000.00000002.2037960840.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs rYhL.exe
                Source: rYhL.exe, 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs rYhL.exe
                Source: rYhL.exe, 00000000.00000002.2041423053.00000000074F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs rYhL.exe
                Source: rYhL.exe, 00000000.00000002.2041923422.0000000007770000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs rYhL.exe
                Source: rYhL.exe, 00000000.00000002.2036563287.000000000156E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rYhL.exe
                Source: rYhL.exeBinary or memory string: OriginalFileName vs rYhL.exe
                Source: rYhL.exe, 00000007.00000002.2090160312.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs rYhL.exe
                Source: rYhL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: rYhL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, h7g8jtZpJbQb8YJRQy.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, h7g8jtZpJbQb8YJRQy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, h7g8jtZpJbQb8YJRQy.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, vkXLbm7NbFnAyYgoFU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, h7g8jtZpJbQb8YJRQy.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, h7g8jtZpJbQb8YJRQy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, h7g8jtZpJbQb8YJRQy.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, vkXLbm7NbFnAyYgoFU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@11/4@2/3
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,5_2_004182CE
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_0041798D
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,7_2_00410DE1
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,5_2_00418758
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,3_2_0040F4AF
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,3_2_0041B539
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AADB
                Source: C:\Users\user\Desktop\rYhL.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rYhL.exe.logJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeMutant created: NULL
                Source: C:\Users\user\Desktop\rYhL.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-ZA03K9
                Source: C:\Users\user\Desktop\rYhL.exeFile created: C:\Users\user\AppData\Local\Temp\bhv6B90.tmpJump to behavior
                Source: rYhL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: rYhL.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\rYhL.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: rYhL.exe, rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: rYhL.exe, rYhL.exe, 00000006.00000002.2088337064.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: rYhL.exe, rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: rYhL.exe, rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: rYhL.exe, rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: rYhL.exe, 00000005.00000002.2096118561.0000000001C0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: rYhL.exe, rYhL.exe, 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: rYhL.exeReversingLabs: Detection: 52%
                Source: rYhL.exeVirustotal: Detection: 55%
                Source: C:\Users\user\Desktop\rYhL.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                Source: unknownProcess created: C:\Users\user\Desktop\rYhL.exe "C:\Users\user\Desktop\rYhL.exe"
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe "C:\Users\user\Desktop\rYhL.exe"
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ybvkuknlzmitkiyc"
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\idaducgmvuafupugdysz"
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe "C:\Users\user\Desktop\rYhL.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ybvkuknlzmitkiyc"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\idaducgmvuafupugdysz"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Users\user\Desktop\rYhL.cfgJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: rYhL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: rYhL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.rYhL.exe.3419478.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: 0.2.rYhL.exe.7770000.5.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, h7g8jtZpJbQb8YJRQy.cs.Net Code: HIIXDyvNoq System.Reflection.Assembly.Load(byte[])
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, h7g8jtZpJbQb8YJRQy.cs.Net Code: HIIXDyvNoq System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CBE1
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_075B70E5 push FFFFFF8Bh; iretd 0_2_075B70E7
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 0_2_075B4C30 push 0000005Dh; ret 0_2_075B4C61
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00457186 push ecx; ret 3_2_00457199
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0045E55D push esi; ret 3_2_0045E566
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00457AA8 push eax; ret 3_2_00457AC6
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00434EB6 push ecx; ret 3_2_00434EC9
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_10002806 push ecx; ret 3_2_10002819
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044693D push ecx; ret 5_2_0044694D
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DB84
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DBAC
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00451D54 push eax; ret 5_2_00451D61
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0A4
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0CC
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00451D34 push eax; ret 6_2_00451D41
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00444E71 push ecx; ret 6_2_00444E81
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00414060 push eax; ret 7_2_00414074
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00414060 push eax; ret 7_2_0041409C
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00414039 push ecx; ret 7_2_00414049
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_004164EB push 0000006Ah; retf 7_2_004165C4
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00416553 push 0000006Ah; retf 7_2_004165C4
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00416555 push 0000006Ah; retf 7_2_004165C4
                Source: rYhL.exeStatic PE information: section name: .text entropy: 7.984419364342549
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, aaRSXXvuBsjyuyfiLYU.csHigh entropy of concatenated method names: 'UvURkGWbnU', 'eiDR8vEDlO', 'D1TRDf8ytH', 'geuRFb6f2v', 'RNpRHMF3cS', 'OfrRcBtFoW', 'OixRSaQxfL', 'c1QR7Zh7Q1', 'qLlRmibdDw', 'hmMRghCHld'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, vkXLbm7NbFnAyYgoFU.csHigh entropy of concatenated method names: 'fVCr6LAjfm', 'hQMrtjYVJ9', 'W1nrKVhkfb', 'bn3rpoqNvC', 'EAhrjR6IVp', 'ekaraYMXRI', 'P95rqtCD6i', 'JT6rfPNNfN', 'zh2rwQvvTR', 'dlGrTHb7WC'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, qUZ0TLKvpjmBmjCs0Z.csHigh entropy of concatenated method names: 'ToString', 'hFv3dtGQkN', 'ltH3oeW89a', 'rAf3Lfdmpa', 'sxJ3CYZKCr', 'Ypm3NwgnGT', 'oyv30KpNZ0', 'SEw32H0i4P', 'uEE3MkLNxo', 'Tvt3VaRWOw'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, t47C6FanJW2IRtMone.csHigh entropy of concatenated method names: 'aCBnfDd3sW', 'GLfnTV5ZlI', 'mkJxuArBkV', 'g0jxvOhpxV', 'kR4nd7I6hy', 'AETnGyQ0uf', 'mSMnh7cbZ0', 'nLwn6T7f8L', 'WHcntbdV8u', 'YFknKmlQg4'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, sDhaTspB15XLIKojId.csHigh entropy of concatenated method names: 'CyHneRPhaO', 'EmPnUueO22', 'ToString', 'Ih8nsY13VG', 'UrknruHEXQ', 'ASDn4RKwf0', 'fx8ni0s9ke', 'zOnnyUVqJo', 'zQcnEaydNM', 'qJEnZCqQN7'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, vdGwgCrHxthcFkMiiA.csHigh entropy of concatenated method names: 'Dispose', 'EhWvwKyWh8', 'YvYbo4pDrk', 'TySNNKgLM2', 'ykkvTGZd6Z', 'BOZvzS6eUh', 'ProcessDialogKey', 'mOsbuCHqyL', 'bJXbvfcRJj', 'bMhbbQFthi'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, cdfytObNftiyQAe8gg.csHigh entropy of concatenated method names: 'lnkDXBemJ', 'vegFXFkPL', 'ceYcLWRxT', 'iPgSSF5ZN', 'hULmAXjF6', 'TdZgAkVVb', 'IFoiSdpYraExHl5DMK', 'JDbUFhBKJKcS69KI7o', 'aRMxRUlQK', 'HoSOefNaQ'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, hTjWrY9nVoo7wOdi4l.csHigh entropy of concatenated method names: 'I3ByQuNF0s', 'atMyrm70ss', 'iE4yirAroT', 'FmRyE0DEtv', 'AawyZSTIwB', 'aKrijRpcIu', 'jJAiaDt9Gn', 'jNviq3HTr5', 'jlEifxG6Ny', 'pjtiwrpvi1'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, fCHqyLwbJXfcRJjvMh.csHigh entropy of concatenated method names: 'Xnux9lJuMo', 'If1xolRhqd', 'XbwxLyQg8J', 'prXxCZf6oX', 'JEqx6b4cMF', 'FDRxN2yNIP', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, eFthi8TAUxRR5bHAiU.csHigh entropy of concatenated method names: 'qGvRvtSHoU', 'oTQRJPQFiv', 'IaORXI1dvx', 'ac2Rs2G71P', 'DnsRroC82F', 'LZ2RioLrmF', 'J3JRyMX8pJ', 'mbMxqVriHx', 'jZUxfJnHfQ', 'NJUxwBbhbt'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, XpdWtb4umxlLfesgQn.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'q9pbwcOBi0', 'PfdbTO2Nt5', 'YZZbzFQL44', 'MwuJuXpvGu', 'tTgJvc6tNn', 'I1XJbNKhf5', 'nKyJJlPYKI', 'cAhvAr9kWPbTSdSErwx'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, zW003qVEqy4LsncnKp.csHigh entropy of concatenated method names: 'a25Ekvvl8N', 'bJiE89P498', 'JfdEDZWxlO', 'EOFEFaDVcS', 'Y2LEH2GZI7', 'nklEcOaV8E', 'ejuESB65wj', 'R0TE7VYtpg', 'UJxEmCj7wm', 'zBvEgJRsSs'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, QuLU3JmOcE6ek5yCM5.csHigh entropy of concatenated method names: 'xhV4FxEVU4', 'xVi4c8qxgq', 'hQJ47IhOEY', 'UA34mTriwi', 'mmH4WVNE0U', 'iiI43raTMa', 'G1j4ni2PuC', 'wOT4xjeqBc', 'qfV4RICMmC', 'IHY4OJqJUn'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, WULmnpvJPSTP1wKRcbl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Q41O6Q7jV5', 'B2rOt65Lm1', 'mrVOKETOsA', 'CN7OpdM0Sh', 'VlmOjoJJcn', 'svwOa1HL9f', 'UdNOqJMUfG'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, sJupmGX8IJy1fHSesh.csHigh entropy of concatenated method names: 'kPBvEkXLbm', 'JbFvZnAyYg', 'cOcveE6ek5', 'iCMvU5bw4A', 'ARXvWki4Tj', 'orYv3nVoo7', 'vXfeQogNeDBXoelt1I', 'AH0vc5N8dJMNF1BGt0', 'vjlSQn2RYAsOkbDvV2', 'Ikovv3sqKN'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, cw4AivgiefADYHRXki.csHigh entropy of concatenated method names: 'QVEiHFx8Fb', 'NieiSWMCNd', 'jDv4Lk0REX', 'UTa4C8M1Vg', 'Gby4NUbQBv', 'nKP40G6kK3', 'Lxt42vieFV', 'XYD4M3H2CT', 'lJ24VSk8Sp', 'obf4YCSa69'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, ixi1ym6907T2vrAhpl.csHigh entropy of concatenated method names: 'QpiWYX7DX9', 'vAtWGX7NHo', 'bp3W6jTGvY', 'SZWWtmMEuq', 'RwvWoT9N54', 'e3pWLBTVGM', 'eFWWCHk2dl', 'rJ2WNjNG4Z', 'xw3W09AeUv', 'yTIW2dE6sk'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, h7g8jtZpJbQb8YJRQy.csHigh entropy of concatenated method names: 'D2PJQZwdB6', 'uV3JssbYmv', 'uWBJrG5SKY', 'M8UJ4kGLfi', 'gQsJi0DIZG', 'KWwJyknkLF', 'FlkJEbc3pe', 'eXZJZfIxAl', 'iHMJIMRk1U', 'UR4JeaOemM'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, MICTxRhm36R84StVrh.csHigh entropy of concatenated method names: 'Gtx57XkqWu', 'or45m0919c', 'eKE59ditxZ', 'kvv5oqmNif', 'd3v5C3ura2', 'bjX5NR0nLq', 'yKj52yMXVR', 'Y1l5MOVZjP', 'uaJ5YeEA5q', 'AhH5dkJVHE'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, xkGZd6fZHOZS6eUheO.csHigh entropy of concatenated method names: 'T98xsys8Yn', 'UWRxrdF981', 'NGDx4AiCYb', 'PZTxianyGC', 'h8Gxy0bdqc', 'kHSxEaT1DY', 'SL7xZ9rt7g', 'g6HxIVT0UI', 'TcXxeZIO3r', 'XBbxUiO8Za'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, QWQ2y62JMaVrHeR1wk.csHigh entropy of concatenated method names: 'iNYEsP4eha', 'BOLE4QmrVA', 'wF8EyvUSUo', 'eBQyTV06VK', 'Whyyz5MHet', 'iobEuUOtXF', 'H1wEvAtxGq', 'HXUEbhe2ER', 'yYtEJoU9DG', 'RowEXTxg5I'
                Source: 0.2.rYhL.exe.456ae98.3.raw.unpack, gandkHvbtWxhOw37mhh.csHigh entropy of concatenated method names: 'qe1Oki3pX6', 'GtqO8KQoIm', 'EVDOD4sr1T', 'fp6B2X4N2gSexjeMARF', 'RrkAwS42UhZycXolIR1', 'tWtdYH4gJn3nSjLpj5x'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, aaRSXXvuBsjyuyfiLYU.csHigh entropy of concatenated method names: 'UvURkGWbnU', 'eiDR8vEDlO', 'D1TRDf8ytH', 'geuRFb6f2v', 'RNpRHMF3cS', 'OfrRcBtFoW', 'OixRSaQxfL', 'c1QR7Zh7Q1', 'qLlRmibdDw', 'hmMRghCHld'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, vkXLbm7NbFnAyYgoFU.csHigh entropy of concatenated method names: 'fVCr6LAjfm', 'hQMrtjYVJ9', 'W1nrKVhkfb', 'bn3rpoqNvC', 'EAhrjR6IVp', 'ekaraYMXRI', 'P95rqtCD6i', 'JT6rfPNNfN', 'zh2rwQvvTR', 'dlGrTHb7WC'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, qUZ0TLKvpjmBmjCs0Z.csHigh entropy of concatenated method names: 'ToString', 'hFv3dtGQkN', 'ltH3oeW89a', 'rAf3Lfdmpa', 'sxJ3CYZKCr', 'Ypm3NwgnGT', 'oyv30KpNZ0', 'SEw32H0i4P', 'uEE3MkLNxo', 'Tvt3VaRWOw'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, t47C6FanJW2IRtMone.csHigh entropy of concatenated method names: 'aCBnfDd3sW', 'GLfnTV5ZlI', 'mkJxuArBkV', 'g0jxvOhpxV', 'kR4nd7I6hy', 'AETnGyQ0uf', 'mSMnh7cbZ0', 'nLwn6T7f8L', 'WHcntbdV8u', 'YFknKmlQg4'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, sDhaTspB15XLIKojId.csHigh entropy of concatenated method names: 'CyHneRPhaO', 'EmPnUueO22', 'ToString', 'Ih8nsY13VG', 'UrknruHEXQ', 'ASDn4RKwf0', 'fx8ni0s9ke', 'zOnnyUVqJo', 'zQcnEaydNM', 'qJEnZCqQN7'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, vdGwgCrHxthcFkMiiA.csHigh entropy of concatenated method names: 'Dispose', 'EhWvwKyWh8', 'YvYbo4pDrk', 'TySNNKgLM2', 'ykkvTGZd6Z', 'BOZvzS6eUh', 'ProcessDialogKey', 'mOsbuCHqyL', 'bJXbvfcRJj', 'bMhbbQFthi'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, cdfytObNftiyQAe8gg.csHigh entropy of concatenated method names: 'lnkDXBemJ', 'vegFXFkPL', 'ceYcLWRxT', 'iPgSSF5ZN', 'hULmAXjF6', 'TdZgAkVVb', 'IFoiSdpYraExHl5DMK', 'JDbUFhBKJKcS69KI7o', 'aRMxRUlQK', 'HoSOefNaQ'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, hTjWrY9nVoo7wOdi4l.csHigh entropy of concatenated method names: 'I3ByQuNF0s', 'atMyrm70ss', 'iE4yirAroT', 'FmRyE0DEtv', 'AawyZSTIwB', 'aKrijRpcIu', 'jJAiaDt9Gn', 'jNviq3HTr5', 'jlEifxG6Ny', 'pjtiwrpvi1'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, fCHqyLwbJXfcRJjvMh.csHigh entropy of concatenated method names: 'Xnux9lJuMo', 'If1xolRhqd', 'XbwxLyQg8J', 'prXxCZf6oX', 'JEqx6b4cMF', 'FDRxN2yNIP', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, eFthi8TAUxRR5bHAiU.csHigh entropy of concatenated method names: 'qGvRvtSHoU', 'oTQRJPQFiv', 'IaORXI1dvx', 'ac2Rs2G71P', 'DnsRroC82F', 'LZ2RioLrmF', 'J3JRyMX8pJ', 'mbMxqVriHx', 'jZUxfJnHfQ', 'NJUxwBbhbt'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, XpdWtb4umxlLfesgQn.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'q9pbwcOBi0', 'PfdbTO2Nt5', 'YZZbzFQL44', 'MwuJuXpvGu', 'tTgJvc6tNn', 'I1XJbNKhf5', 'nKyJJlPYKI', 'cAhvAr9kWPbTSdSErwx'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, zW003qVEqy4LsncnKp.csHigh entropy of concatenated method names: 'a25Ekvvl8N', 'bJiE89P498', 'JfdEDZWxlO', 'EOFEFaDVcS', 'Y2LEH2GZI7', 'nklEcOaV8E', 'ejuESB65wj', 'R0TE7VYtpg', 'UJxEmCj7wm', 'zBvEgJRsSs'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, QuLU3JmOcE6ek5yCM5.csHigh entropy of concatenated method names: 'xhV4FxEVU4', 'xVi4c8qxgq', 'hQJ47IhOEY', 'UA34mTriwi', 'mmH4WVNE0U', 'iiI43raTMa', 'G1j4ni2PuC', 'wOT4xjeqBc', 'qfV4RICMmC', 'IHY4OJqJUn'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, WULmnpvJPSTP1wKRcbl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Q41O6Q7jV5', 'B2rOt65Lm1', 'mrVOKETOsA', 'CN7OpdM0Sh', 'VlmOjoJJcn', 'svwOa1HL9f', 'UdNOqJMUfG'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, sJupmGX8IJy1fHSesh.csHigh entropy of concatenated method names: 'kPBvEkXLbm', 'JbFvZnAyYg', 'cOcveE6ek5', 'iCMvU5bw4A', 'ARXvWki4Tj', 'orYv3nVoo7', 'vXfeQogNeDBXoelt1I', 'AH0vc5N8dJMNF1BGt0', 'vjlSQn2RYAsOkbDvV2', 'Ikovv3sqKN'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, cw4AivgiefADYHRXki.csHigh entropy of concatenated method names: 'QVEiHFx8Fb', 'NieiSWMCNd', 'jDv4Lk0REX', 'UTa4C8M1Vg', 'Gby4NUbQBv', 'nKP40G6kK3', 'Lxt42vieFV', 'XYD4M3H2CT', 'lJ24VSk8Sp', 'obf4YCSa69'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, ixi1ym6907T2vrAhpl.csHigh entropy of concatenated method names: 'QpiWYX7DX9', 'vAtWGX7NHo', 'bp3W6jTGvY', 'SZWWtmMEuq', 'RwvWoT9N54', 'e3pWLBTVGM', 'eFWWCHk2dl', 'rJ2WNjNG4Z', 'xw3W09AeUv', 'yTIW2dE6sk'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, h7g8jtZpJbQb8YJRQy.csHigh entropy of concatenated method names: 'D2PJQZwdB6', 'uV3JssbYmv', 'uWBJrG5SKY', 'M8UJ4kGLfi', 'gQsJi0DIZG', 'KWwJyknkLF', 'FlkJEbc3pe', 'eXZJZfIxAl', 'iHMJIMRk1U', 'UR4JeaOemM'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, MICTxRhm36R84StVrh.csHigh entropy of concatenated method names: 'Gtx57XkqWu', 'or45m0919c', 'eKE59ditxZ', 'kvv5oqmNif', 'd3v5C3ura2', 'bjX5NR0nLq', 'yKj52yMXVR', 'Y1l5MOVZjP', 'uaJ5YeEA5q', 'AhH5dkJVHE'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, xkGZd6fZHOZS6eUheO.csHigh entropy of concatenated method names: 'T98xsys8Yn', 'UWRxrdF981', 'NGDx4AiCYb', 'PZTxianyGC', 'h8Gxy0bdqc', 'kHSxEaT1DY', 'SL7xZ9rt7g', 'g6HxIVT0UI', 'TcXxeZIO3r', 'XBbxUiO8Za'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, QWQ2y62JMaVrHeR1wk.csHigh entropy of concatenated method names: 'iNYEsP4eha', 'BOLE4QmrVA', 'wF8EyvUSUo', 'eBQyTV06VK', 'Whyyz5MHet', 'iobEuUOtXF', 'H1wEvAtxGq', 'HXUEbhe2ER', 'yYtEJoU9DG', 'RowEXTxg5I'
                Source: 0.2.rYhL.exe.74f0000.4.raw.unpack, gandkHvbtWxhOw37mhh.csHigh entropy of concatenated method names: 'qe1Oki3pX6', 'GtqO8KQoIm', 'EVDOD4sr1T', 'fp6B2X4N2gSexjeMARF', 'RrkAwS42UhZycXolIR1', 'tWtdYH4gJn3nSjLpj5x'
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00406EEB ShellExecuteW,URLDownloadToFileW,3_2_00406EEB
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AADB

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: adobe 12.png
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CBE1
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTR
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040F7E2 Sleep,ExitProcess,3_2_0040F7E2
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: 19E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: 33E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: 31D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: 9330000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: A330000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: A530000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: B530000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
                Source: C:\Users\user\Desktop\rYhL.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_0041A7D9
                Source: C:\Users\user\Desktop\rYhL.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeWindow / User API: threadDelayed 5282Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeWindow / User API: threadDelayed 4707Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-53429
                Source: C:\Users\user\Desktop\rYhL.exeAPI coverage: 9.7 %
                Source: C:\Users\user\Desktop\rYhL.exe TID: 5268Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exe TID: 6680Thread sleep count: 5282 > 30Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exe TID: 6680Thread sleep time: -15846000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exe TID: 6680Thread sleep count: 4707 > 30Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exe TID: 6680Thread sleep time: -14121000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_0040928E
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C322
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C388
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_004096A0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_00408847
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00407877 FindFirstFileW,FindNextFileW,3_2_00407877
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0044E8F9 FindFirstFileExA,3_2_0044E8F9
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB6B
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419B86
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD72
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_100010F1
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_10006580 FindFirstFileExA,3_2_10006580
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407CD2
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_00418981 memset,GetSystemInfo,5_2_00418981
                Source: C:\Users\user\Desktop\rYhL.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: rYhL.exe, 00000003.00000002.4484426646.00000000015BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: rYhL.exe, 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWy\
                Source: bhv6B90.tmp.5.drBinary or memory string: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpXOaQeBtbq%2B7LgJauNdx5lF%2FQ%2FOy2qwXRNGjU%3D&Manufacturer=VMware%2C%20Inc.&Model=VMware20%2C1&Language=en&Locale=en-US
                Source: C:\Users\user\Desktop\rYhL.exeAPI call chain: ExitProcess graph end nodegraph_3-55146
                Source: C:\Users\user\Desktop\rYhL.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\rYhL.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00434A8A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CBE1
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00443355 mov eax, dword ptr fs:[00000030h]3_2_00443355
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_10004AB4 mov eax, dword ptr fs:[00000030h]3_2_10004AB4
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00411D39 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,3_2_00411D39
                Source: C:\Users\user\Desktop\rYhL.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0043503C
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00434A8A
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043BB71
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00434BD8 SetUnhandledExceptionFilter,3_2_00434BD8
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_100060E2
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_10002639
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_10002B1C
                Source: C:\Users\user\Desktop\rYhL.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_0041812A
                Source: C:\Users\user\Desktop\rYhL.exeMemory written: C:\Users\user\Desktop\rYhL.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: NULL target: C:\Users\user\Desktop\rYhL.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: NULL target: C:\Users\user\Desktop\rYhL.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeSection loaded: NULL target: C:\Users\user\Desktop\rYhL.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_00412132
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00419662 mouse_event,3_2_00419662
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe "C:\Users\user\Desktop\rYhL.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ybvkuknlzmitkiyc"Jump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeProcess created: C:\Users\user\Desktop\rYhL.exe C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\idaducgmvuafupugdysz"Jump to behavior
                Source: rYhL.exe, 00000003.00000002.4484224435.0000000001581000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: rYhL.exe, 00000003.00000002.4484224435.0000000001581000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDz}k
                Source: rYhL.exe, 00000003.00000002.4484224435.0000000001581000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManageryzPk
                Source: rYhL.exe, 00000003.00000002.4484224435.0000000001581000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager|zUk
                Source: rYhL.exe, 00000003.00000002.4484224435.0000000001581000.00000004.00000020.00020000.00000000.sdmp, rYhL.exe, 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00434CB6 cpuid 3_2_00434CB6
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetLocaleInfoA,3_2_0040F90C
                Source: C:\Users\user\Desktop\rYhL.exeCode function: EnumSystemLocalesW,3_2_0045201B
                Source: C:\Users\user\Desktop\rYhL.exeCode function: EnumSystemLocalesW,3_2_004520B6
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00452143
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetLocaleInfoW,3_2_00452393
                Source: C:\Users\user\Desktop\rYhL.exeCode function: EnumSystemLocalesW,3_2_00448484
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_004524BC
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetLocaleInfoW,3_2_004525C3
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00452690
                Source: C:\Users\user\Desktop\rYhL.exeCode function: GetLocaleInfoW,3_2_0044896D
                Source: C:\Users\user\Desktop\rYhL.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00451D58
                Source: C:\Users\user\Desktop\rYhL.exeCode function: EnumSystemLocalesW,3_2_00451FD0
                Source: C:\Users\user\Desktop\rYhL.exeQueries volume information: C:\Users\user\Desktop\rYhL.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00404F51 GetLocalTime,CreateEventA,CreateThread,3_2_00404F51
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_0041B69E GetComputerNameExW,GetUserNameW,3_2_0041B69E
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 3_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,3_2_00449210
                Source: C:\Users\user\Desktop\rYhL.exeCode function: 5_2_0041739B GetVersionExW,5_2_0041739B
                Source: C:\Users\user\Desktop\rYhL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTR
                Source: C:\Users\user\Desktop\rYhL.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040BA4D
                Source: C:\Users\user\Desktop\rYhL.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040BB6B
                Source: C:\Users\user\Desktop\rYhL.exeCode function: \key3.db3_2_0040BB6B
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Users\user\Desktop\rYhL.exeCode function: ESMTPPassword6_2_004033F0
                Source: C:\Users\user\Desktop\rYhL.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword6_2_00402DB3
                Source: C:\Users\user\Desktop\rYhL.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword6_2_00402DB3
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 4308, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: C:\Users\user\Desktop\rYhL.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-ZA03K9Jump to behavior
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.rYhL.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.46254b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.456ae98.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rYhL.exe.43e9970.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 6196, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rYhL.exe PID: 5884, type: MEMORYSTR
                Source: C:\Users\user\Desktop\rYhL.exeCode function: cmd.exe3_2_0040569A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Bypass User Account Control
                1
                Deobfuscate/Decode Files or Information
                111
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                Logon Script (Windows)1
                Access Token Manipulation
                3
                Obfuscated Files or Information
                2
                Credentials in Registry
                1
                System Service Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                Windows Service
                12
                Software Packing
                3
                Credentials In Files
                3
                File and Directory Discovery
                Distributed Component Object Model111
                Input Capture
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script322
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets38
                System Information Discovery
                SSH3
                Clipboard Data
                2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Bypass User Account Control
                Cached Domain Credentials31
                Security Software Discovery
                VNCGUI Input Capture12
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Masquerading
                DCSync31
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc Filesystem4
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron322
                Process Injection
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501601 Sample: rYhL.exe Startdate: 30/08/2024 Architecture: WINDOWS Score: 100 27 15.164.165.52.in-addr.arpa 2->27 29 geoplugin.net 2->29 43 Suricata IDS alerts for network traffic 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 12 other signatures 2->49 8 rYhL.exe 3 2->8         started        signatures3 process4 file5 25 C:\Users\user\AppData\Local\...\rYhL.exe.log, ASCII 8->25 dropped 51 Contains functionality to bypass UAC (CMSTPLUA) 8->51 53 Tries to steal Mail credentials (via file registry) 8->53 55 Contains functionalty to change the wallpaper 8->55 57 6 other signatures 8->57 12 rYhL.exe 3 13 8->12         started        signatures6 process7 dnsIp8 31 67.207.161.204, 2404, 49708, 49709 AS-COLOAMUS United States 12->31 33 127.0.0.1 unknown unknown 12->33 35 geoplugin.net 178.237.33.50, 49710, 80 ATOM86-ASATOM86NL Netherlands 12->35 59 Detected Remcos RAT 12->59 61 Maps a DLL or memory area into another process 12->61 16 rYhL.exe 1 12->16         started        19 rYhL.exe 1 12->19         started        21 rYhL.exe 2 12->21         started        23 rYhL.exe 12->23         started        signatures9 process10 signatures11 37 Tries to steal Instant Messenger accounts or passwords 16->37 39 Tries to steal Mail credentials (via file / registry access) 16->39 41 Tries to harvest and steal browser information (history, passwords, etc) 19->41

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                rYhL.exe53%ReversingLabsWin32.Trojan.SnakeKeyLogger
                rYhL.exe55%VirustotalBrowse
                rYhL.exe100%AviraHEUR/AGEN.1306920
                rYhL.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                geoplugin.net1%VirustotalBrowse
                15.164.165.52.in-addr.arpa0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://www.imvu.comr0%URL Reputationsafe
                http://www.imvu.comr0%URL Reputationsafe
                https://aefd.nelreports.net/api/report?cat=bingaot0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                http://www.imvu.com0%URL Reputationsafe
                https://aefd.nelreports.net/api/report?cat=bingrms0%URL Reputationsafe
                https://login.yahoo.com/config/login0%URL Reputationsafe
                https://aefd.nelreports.net/api/report?cat=bingaotak0%URL Reputationsafe
                https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                http://www.ebuddy.com0%URL Reputationsafe
                https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P0%Avira URL Cloudsafe
                https://www.office.com/0%Avira URL Cloudsafe
                https://www.google.com0%Avira URL Cloudsafe
                https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF0%Avira URL Cloudsafe
                https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf18270730%Avira URL Cloudsafe
                https://maps.windows.com/windows-app-web-link0%Avira URL Cloudsafe
                https://login.li0%Avira URL Cloudsafe
                https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e0%Avira URL Cloudsafe
                https://www.office.com/0%VirustotalBrowse
                https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF0%VirustotalBrowse
                https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                https://login.li0%VirustotalBrowse
                http://www.nirsoft.net0%Avira URL Cloudsafe
                http://www.nirsoft.net/0%Avira URL Cloudsafe
                http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                https://maps.windows.com/windows-app-web-link0%VirustotalBrowse
                127.0.0.10%Avira URL Cloudsafe
                https://www.google.com/accounts/servicelogin0%VirustotalBrowse
                https://www.google.com0%VirustotalBrowse
                http://www.nirsoft.net0%VirustotalBrowse
                127.0.0.10%VirustotalBrowse
                http://www.nirsoft.net/0%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                geoplugin.net
                178.237.33.50
                truefalseunknown
                15.164.165.52.in-addr.arpa
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gpfalse
                • URL Reputation: safe
                unknown
                127.0.0.1true
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=Pbhv6B90.tmp.5.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.comrYhL.exe, rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.office.com/bhv6B90.tmp.5.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.imvu.comrrYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073bhv6B90.tmp.5.drfalse
                • Avira URL Cloud: safe
                unknown
                https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AFbhv6B90.tmp.5.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=bingaotbhv6B90.tmp.5.drfalse
                • URL Reputation: safe
                unknown
                http://geoplugin.net/json.gp/CrYhL.exe, 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, rYhL.exe, 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://maps.windows.com/windows-app-web-linkbhv6B90.tmp.5.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://login.lirYhL.exe, 00000005.00000002.2095074785.000000000116C000.00000004.00000010.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949ebhv6B90.tmp.5.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.imvu.comrYhL.exe, rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=bingrmsbhv6B90.tmp.5.drfalse
                • URL Reputation: safe
                unknown
                https://www.google.com/accounts/serviceloginrYhL.exefalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://login.yahoo.com/config/loginrYhL.exefalse
                • URL Reputation: safe
                unknown
                http://www.nirsoft.netrYhL.exe, 00000005.00000002.2095139644.00000000014F4000.00000004.00000010.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://aefd.nelreports.net/api/report?cat=bingaotakbhv6B90.tmp.5.drfalse
                • URL Reputation: safe
                unknown
                https://deff.nelreports.net/api/report?cat=msnbhv6B90.tmp.5.drfalse
                • URL Reputation: safe
                unknown
                http://www.nirsoft.net/rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comrYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.ebuddy.comrYhL.exe, rYhL.exe, 00000007.00000002.2090160312.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                67.207.161.204
                unknownUnited States
                21769AS-COLOAMUStrue
                178.237.33.50
                geoplugin.netNetherlands
                8455ATOM86-ASATOM86NLfalse
                IP
                127.0.0.1
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1501601
                Start date and time:2024-08-30 07:23:07 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 5s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:10
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:rYhL.exe
                Detection:MAL
                Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@11/4@2/3
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 284
                • Number of non-executed functions: 231
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                TimeTypeDescription
                01:23:56API Interceptor5052823x Sleep call for process: rYhL.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                178.237.33.50InQEpnEuHC.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                rBslc_Pymt-Hs.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                • geoplugin.net/json.gp
                FdSJYyDayo.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                Ravakhu24105.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.9070.28632.rtfGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                BP-30M31_20240829_093844.exeGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                P.O_Qouts_t87E90Y-E4R7G-PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • geoplugin.net/json.gp
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.24787.2174.rtfGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                PMT-INV0230824AUG.xla.xlsxGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                French Group.jsGet hashmaliciousRemcosBrowse
                • geoplugin.net/json.gp
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                geoplugin.netInQEpnEuHC.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                rBslc_Pymt-Hs.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                • 178.237.33.50
                FdSJYyDayo.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                Ravakhu24105.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.9070.28632.rtfGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                BP-30M31_20240829_093844.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                P.O_Qouts_t87E90Y-E4R7G-PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 178.237.33.50
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.24787.2174.rtfGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                PMT-INV0230824AUG.xla.xlsxGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                French Group.jsGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AS-COLOAMUSLFcq74J1fZ.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                • 67.207.166.175
                Metal & Copper Technical Specification List.xlsGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                Metal & Copper Technical Specification List.xlsGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                Steel and Metal Coil Inquiry Sheet - Copy.xlsGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                Metal & Copper Technical Specification List.xlsGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                Steel and Metal Coil Inquiry Sheet - Copy.xlsGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                Steel and Metal Coil Inquiry Sheet - Copy.xlsGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                Magnet Product List Drawing DESIGN.xlsGet hashmaliciousHTMLPhisherBrowse
                • 67.207.166.175
                ulxtlTEcyB.rtfGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                Moto Parts Specifications 10000pcs.xlsGet hashmaliciousUnknownBrowse
                • 67.207.166.175
                ATOM86-ASATOM86NLInQEpnEuHC.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                rBslc_Pymt-Hs.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                • 178.237.33.50
                FdSJYyDayo.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                Ravakhu24105.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.9070.28632.rtfGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                BP-30M31_20240829_093844.exeGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                P.O_Qouts_t87E90Y-E4R7G-PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 178.237.33.50
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.24787.2174.rtfGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                PMT-INV0230824AUG.xla.xlsxGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                French Group.jsGet hashmaliciousRemcosBrowse
                • 178.237.33.50
                No context
                No context
                Process:C:\Users\user\Desktop\rYhL.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1216
                Entropy (8bit):5.34331486778365
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                Malicious:true
                Reputation:high, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                Process:C:\Users\user\Desktop\rYhL.exe
                File Type:JSON data
                Category:dropped
                Size (bytes):962
                Entropy (8bit):5.013811273052389
                Encrypted:false
                SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                Process:C:\Users\user\Desktop\rYhL.exe
                File Type:Extensible storage engine DataBase, version 0x620, checksum 0xb2117364, page size 32768, DirtyShutdown, Windows version 10.0
                Category:dropped
                Size (bytes):17301504
                Entropy (8bit):0.801200608050408
                Encrypted:false
                SSDEEP:6144:idfjZb5aXEY2waXEY24URlMe4APXAP5APzAPwbndOO8pHAP6JnTJnTbnSotnBQ+z:wVS4e81ySaKKjLrONseWe
                MD5:3E472A482F490059135BB1B93290CE4A
                SHA1:18A23FAE42EBE80A3719F034ECDCB22D35604ACC
                SHA-256:EA4F443DBF76C1001A8A2191424A6E05CD9B54116A58E0D0FA0E769B1F292030
                SHA-512:AD3E7941902759A59644AEE18FF2C2EAABBDC1EA430A5502D7950DB2418C71543DA12A53F4119691536A4B5139BEEF4C30E1679A2F2BD8B65FF51E8082873DCB
                Malicious:false
                Reputation:low
                Preview:..sd... .......;!......E{ow("...{........................@...../....{A.*....|..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{]....................................I*....|.....................*....|...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\rYhL.exe
                File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                Category:dropped
                Size (bytes):2
                Entropy (8bit):1.0
                Encrypted:false
                SSDEEP:3:Qn:Qn
                MD5:F3B25701FE362EC84616A93A45CE9998
                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                Malicious:false
                Reputation:high, very likely benign file
                Preview:..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.971036074202022
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:rYhL.exe
                File size:961'536 bytes
                MD5:ca4ccb77c304e8074abd359dd086ede4
                SHA1:4a17bc625d34ccde78a62db109877f8e9d808d70
                SHA256:f127eced7a835fecf3453bcb307040fb4e91bfc0c63983d2a8d6c0dd72a4e5c1
                SHA512:f2ee3df238385bcadb32dd658330e825252de969d8a1e24a0457e8f7268c362d8c73420f2e062e920d6a3e975f2b74a091475a63e0150837af9e013a674a71f2
                SSDEEP:24576:kEbp9p29m6p2SxSrExb5Ag+PmiCix5InZg0SO:Xl90X8Axb5Ag+Pm7O5Ie0SO
                TLSH:A2152317312C6B7DDA7A0BF47AB565B0033186D73206EBA93CDEDEAF0621B1005229D7
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0..0...z.......N... ...`....@.. ....................................@................................
                Icon Hash:2c6c8d96625d6c70
                Entrypoint:0x4e4ea2
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x66CFCCEA [Thu Aug 29 01:20:42 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xe4e500x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xe60000x7748.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000xe2ea80xe3000755523a4ee515ccd2b740f673f6bf1b8False0.9808408762389867data7.984419364342549IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0xe60000x77480x7800495a773b2eb6d233d00aaa2ab0881f8eFalse0.5180989583333333data6.3975271810787975IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0xee0000xc0x20091aa819e727435dc3b9c07c69c508fd5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0xe62200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 32395 x 32395 px/m0.5132978723404256
                RT_ICON0xe66880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 32395 x 32395 px/m0.3487704918032787
                RT_ICON0xe70100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 32395 x 32395 px/m0.26360225140712945
                RT_ICON0xe80b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 32395 x 32395 px/m0.1725103734439834
                RT_ICON0xea6600x2b70PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9746402877697842
                RT_GROUP_ICON0xed1d00x4cdata0.75
                RT_GROUP_ICON0xed21c0x14data1.05
                RT_VERSION0xed2300x32cdata0.43103448275862066
                RT_MANIFEST0xed55c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                DLLImport
                mscoree.dll_CorExeMain
                TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                2024-08-30T07:24:01.556506+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1497092404192.168.2.567.207.161.204
                2024-08-30T07:24:00.199674+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1497082404192.168.2.567.207.161.204
                2024-08-30T07:24:01.578929+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa34971080192.168.2.5178.237.33.50
                TimestampSource PortDest PortSource IPDest IP
                Aug 30, 2024 07:23:59.542221069 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:23:59.547203064 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:23:59.547297001 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:23:59.552174091 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:23:59.561499119 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.155898094 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.199673891 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.291204929 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.294891119 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.299674988 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.299740076 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.304662943 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.775973082 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.777864933 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.782694101 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.893908978 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.895879984 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.900774002 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.900890112 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.904149055 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.908981085 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:00.947091103 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:00.957698107 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:24:00.962555885 CEST8049710178.237.33.50192.168.2.5
                Aug 30, 2024 07:24:00.962632895 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:24:00.962835073 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:24:00.967650890 CEST8049710178.237.33.50192.168.2.5
                Aug 30, 2024 07:24:01.508219957 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.556505919 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:01.578870058 CEST8049710178.237.33.50192.168.2.5
                Aug 30, 2024 07:24:01.578928947 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:24:01.635324001 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:01.642843962 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.643925905 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.649768114 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:01.658458948 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.658540964 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:01.664253950 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.946702003 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.946717978 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.946732044 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.946741104 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.946753979 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:01.946767092 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:01.946803093 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.013829947 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.013847113 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.013859987 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.013871908 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.013885975 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.013900995 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.013935089 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.014169931 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.014213085 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.014250994 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.037705898 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.037734032 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.037744045 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.037756920 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.037756920 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.037779093 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.076905966 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.080823898 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.080887079 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.080898046 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.080923080 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.080924988 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.080955982 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.080957890 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.080967903 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.080996990 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.081007957 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.081018925 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.081049919 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.104588032 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104603052 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104614019 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104638100 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.104794979 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104826927 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.104849100 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104860067 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104888916 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104891062 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.104899883 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.104924917 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.148211956 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.148237944 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.148253918 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.148266077 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.148271084 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.148298979 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.148469925 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.148488045 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.148499012 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.148524046 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.148992062 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.149002075 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.149013996 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.149028063 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.149038076 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.149045944 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.149492025 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.149502039 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.149513006 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.149522066 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.149552107 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.172877073 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.172888994 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.172899961 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.172909021 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.172919989 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.172919989 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.172935963 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.173161030 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.173171043 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.173181057 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.173190117 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.173192978 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.173202991 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.173209906 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.173238039 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.173985004 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.175398111 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.175435066 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.215759039 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215781927 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215792894 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215801954 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215812922 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215821981 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.215826988 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215845108 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.215868950 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215873957 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.215881109 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.215912104 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.216603994 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.216614962 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.216625929 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.216638088 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.216656923 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.216686964 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.217292070 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.217308044 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.217318058 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.217328072 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.217335939 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.217339039 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.217353106 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.218084097 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.218115091 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.240335941 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240515947 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240526915 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240539074 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240552902 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.240588903 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.240660906 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240670919 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240681887 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240721941 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.240840912 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240850925 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240861893 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.240878105 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.240909100 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.241202116 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.241219044 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.241229057 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.241239071 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.241249084 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.241260052 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.241271019 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.241296053 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.242633104 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.288733006 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.288747072 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.288758039 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.288768053 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.288773060 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.288779974 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.288791895 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.288793087 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.288829088 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.288995028 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.289005041 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.289015055 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.289040089 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.289047003 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.289057016 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.289058924 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.289067984 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.289082050 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.289998055 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.290009022 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.290019035 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.290028095 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.290029049 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.290039062 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.290047884 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.290050983 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.290074110 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.290822983 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.290854931 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.290869951 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.306577921 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.306600094 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.306610107 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.306618929 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.306629896 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.306638956 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.306642056 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.306672096 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.307044983 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.307054996 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.307065964 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.307075977 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.307085991 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.307091951 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.307101011 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.307102919 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.307132006 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.307890892 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.307923079 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.307997942 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308007956 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308017969 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308027029 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308036089 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.308037996 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308060884 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.308837891 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308859110 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308867931 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.308868885 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308895111 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308903933 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308917046 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.308923006 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.308948994 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.350698948 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.350712061 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.350729942 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.350739002 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.350749016 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.350750923 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.350759983 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.350788116 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.350800037 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.351129055 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.351140022 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.351150990 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.351162910 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.351182938 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.351188898 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.351195097 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.351207018 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.351233006 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.352052927 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.352063894 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.352073908 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.352083921 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.352087975 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.352097034 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.352097988 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.352109909 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.352123022 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.352896929 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.352926970 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.353678942 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.353689909 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.353699923 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.353708982 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.353719950 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.353749037 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.353905916 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.353930950 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.353941917 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.353960037 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.354034901 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.354044914 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.354055882 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.354073048 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.354095936 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.354895115 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.354906082 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.354917049 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.354944944 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.355273962 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.355309010 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.355941057 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356019020 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356029034 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356057882 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.356093884 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356103897 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356113911 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356127977 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356128931 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.356138945 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356143951 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.356167078 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.356970072 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.356988907 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.357023001 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374278069 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374298096 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374309063 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374319077 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374327898 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374336958 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374342918 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374351978 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374361992 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374365091 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374372005 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374383926 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374383926 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374407053 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374593973 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374630928 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374665976 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374775887 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374788046 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374798059 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374806881 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374813080 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374816895 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374825954 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374830008 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374842882 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374850988 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.374851942 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.374883890 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.417959929 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.417985916 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.417995930 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418005943 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418015957 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418025017 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418029070 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.418035984 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418045998 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418056011 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418065071 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418075085 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418083906 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418090105 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.418095112 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418103933 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418107033 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.418114901 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418126106 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.418144941 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.418817043 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418829918 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418840885 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418857098 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.418886900 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.418890953 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418904066 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418915033 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.418940067 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.419334888 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.419346094 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.419356108 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.419365883 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.419372082 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.419401884 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422060966 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422091007 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422099113 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422105074 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422132015 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422147036 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422331095 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422348022 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422358036 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422368050 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422369003 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422385931 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422534943 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422544956 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422554970 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422564030 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422571898 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422574997 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422585011 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422586918 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422595978 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.422616005 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.422627926 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.423188925 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.423208952 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.423221111 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.423229933 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.423242092 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.423249960 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.423249960 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.423274994 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.428318024 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.428332090 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.428343058 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.428364992 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.428417921 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.428427935 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.428436995 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.428447008 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.428458929 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.428488016 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441505909 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441519976 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441529989 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441540003 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441551924 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441556931 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441561937 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441574097 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441605091 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441621065 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441718102 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441730022 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441792965 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441879988 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441890955 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441900969 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441919088 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441920996 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441932917 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441942930 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441952944 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441962004 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441966057 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441972971 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441983938 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.441992044 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.441998959 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.442009926 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.444655895 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.444668055 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.444681883 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.444689989 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.444694042 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.444710970 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.444730043 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.444741011 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.444758892 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.444813013 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.444849014 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.446975946 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.446985960 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.446996927 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447030067 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.447074890 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447084904 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447096109 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447109938 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447118998 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.447119951 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447132111 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447134972 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.447144032 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447153091 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447153091 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.447180986 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.447483063 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447494984 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447506905 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.447521925 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.447537899 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.484976053 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.484992981 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485014915 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485030890 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485043049 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485048056 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.485053062 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485074997 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485085964 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485096931 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485104084 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.485107899 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485120058 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485121965 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.485133886 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485140085 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.485163927 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.485457897 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485469103 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485480070 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485497952 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485507011 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485517979 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485519886 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.485529900 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485547066 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.485562086 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485574007 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.485594988 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.486227989 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.486239910 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.486253023 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.486259937 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.486289024 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.508750916 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.508779049 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.508790970 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.508822918 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.508826971 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.508840084 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.508850098 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.508861065 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.508861065 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.508898020 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.509044886 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509057045 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509068966 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509087086 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.509104967 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509110928 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.509118080 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509135008 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509151936 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.509154081 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509169102 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509179115 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509187937 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.509188890 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509202957 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.509212017 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.509236097 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.510001898 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.510014057 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.510025978 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.510045052 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.512943983 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.512990952 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.513045073 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513053894 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513067007 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513077021 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513087034 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.513089895 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513112068 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.513288975 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513345957 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513375998 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.513479948 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513490915 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513501883 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513510942 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.513520956 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513531923 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513535976 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.513542891 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513554096 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.513562918 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.513581991 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.514239073 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514250994 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514261961 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514283895 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.514434099 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514444113 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514455080 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514462948 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.514466047 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514478922 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.514482975 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.514508009 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.519656897 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.519682884 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.519692898 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.519718885 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.519731045 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.519742012 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.519752979 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.519769907 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.519802094 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.519987106 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.520040035 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.520081043 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.532413960 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532426119 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532437086 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532453060 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532463074 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532474041 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.532511950 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.532551050 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532561064 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532571077 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532581091 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.532605886 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.532680988 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532691002 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532700062 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532710075 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532718897 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.532720089 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532731056 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532735109 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.532742023 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.532771111 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.533505917 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.533516884 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.533529043 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.533536911 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.533539057 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.533550024 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.533554077 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.533560991 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.533581972 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.537823915 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.537857056 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.537868023 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.537894964 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.537928104 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.537940025 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.537950039 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.537988901 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.538007975 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538064957 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538074017 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538095951 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.538152933 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538163900 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538173914 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538182020 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.538184881 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538214922 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.538248062 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538258076 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538268089 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538278103 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538285017 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.538312912 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.538938046 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.538973093 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.538996935 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.539007902 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.539019108 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.539027929 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.539036989 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.539052963 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.573892117 CEST8049710178.237.33.50192.168.2.5
                Aug 30, 2024 07:24:02.573935986 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:24:02.575503111 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575514078 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575524092 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575552940 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.575584888 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575603008 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575615883 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575624943 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575627089 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.575635910 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.575642109 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.575673103 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.576009035 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576018095 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576046944 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.576097965 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576107979 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576117992 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576148033 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.576314926 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576325893 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576335907 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576344013 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.576354980 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576364994 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576368093 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.576375961 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576392889 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.576790094 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576800108 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576809883 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576817036 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.576821089 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:02.576843023 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:02.618954897 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:03.770982981 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:03.776246071 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776288033 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776298046 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776307106 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776314974 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776321888 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:03.776326895 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776339054 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776344061 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:03.776348114 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776367903 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.776376963 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.781254053 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.781269073 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.781276941 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.781289101 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.781333923 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.781342030 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.781764030 CEST24044970967.207.161.204192.168.2.5
                Aug 30, 2024 07:24:03.787661076 CEST497092404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:06.004367113 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:06.006038904 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:06.011193037 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:36.020580053 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:24:36.025322914 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:24:36.030162096 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:25:06.033679962 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:25:06.035047054 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:25:06.039917946 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:25:36.033550978 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:25:36.035165071 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:25:36.040008068 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:25:50.931551933 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:25:51.244149923 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:25:51.853344917 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:25:53.056437969 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:25:55.462703943 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:26:00.275213003 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:26:06.054006100 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:26:06.055386066 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:26:06.060246944 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:26:09.884556055 CEST4971080192.168.2.5178.237.33.50
                Aug 30, 2024 07:26:36.066092014 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:26:36.090229988 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:26:36.095125914 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:27:06.080120087 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:27:06.083106041 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:27:06.087889910 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:27:36.096549988 CEST24044970867.207.161.204192.168.2.5
                Aug 30, 2024 07:27:36.099406004 CEST497082404192.168.2.567.207.161.204
                Aug 30, 2024 07:27:36.104695082 CEST24044970867.207.161.204192.168.2.5
                TimestampSource PortDest PortSource IPDest IP
                Aug 30, 2024 07:24:00.942540884 CEST6530353192.168.2.51.1.1.1
                Aug 30, 2024 07:24:00.951860905 CEST53653031.1.1.1192.168.2.5
                Aug 30, 2024 07:24:29.813477039 CEST5357329162.159.36.2192.168.2.5
                Aug 30, 2024 07:24:30.292942047 CEST5097253192.168.2.51.1.1.1
                Aug 30, 2024 07:24:30.300647020 CEST53509721.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Aug 30, 2024 07:24:00.942540884 CEST192.168.2.51.1.1.10x15cbStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                Aug 30, 2024 07:24:30.292942047 CEST192.168.2.51.1.1.10x851eStandard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Aug 30, 2024 07:24:00.951860905 CEST1.1.1.1192.168.2.50x15cbNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                Aug 30, 2024 07:24:30.300647020 CEST1.1.1.1192.168.2.50x851eName error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                • geoplugin.net
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.549710178.237.33.50805884C:\Users\user\Desktop\rYhL.exe
                TimestampBytes transferredDirectionData
                Aug 30, 2024 07:24:00.962835073 CEST71OUTGET /json.gp HTTP/1.1
                Host: geoplugin.net
                Cache-Control: no-cache
                Aug 30, 2024 07:24:01.578870058 CEST1170INHTTP/1.1 200 OK
                date: Fri, 30 Aug 2024 05:24:01 GMT
                server: Apache
                content-length: 962
                content-type: application/json; charset=utf-8
                cache-control: public, max-age=300
                access-control-allow-origin: *
                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:23:55
                Start date:30/08/2024
                Path:C:\Users\user\Desktop\rYhL.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\rYhL.exe"
                Imagebase:0xf70000
                File size:961'536 bytes
                MD5 hash:CA4CCB77C304E8074ABD359DD086EDE4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2038533702.00000000043E9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low
                Has exited:true

                Target ID:3
                Start time:01:23:56
                Start date:30/08/2024
                Path:C:\Users\user\Desktop\rYhL.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\rYhL.exe"
                Imagebase:0xd40000
                File size:961'536 bytes
                MD5 hash:CA4CCB77C304E8074ABD359DD086EDE4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4484224435.0000000001547000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                Reputation:low
                Has exited:false

                Target ID:4
                Start time:01:24:01
                Start date:30/08/2024
                Path:C:\Users\user\Desktop\rYhL.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
                Imagebase:0x80000
                File size:961'536 bytes
                MD5 hash:CA4CCB77C304E8074ABD359DD086EDE4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:5
                Start time:01:24:01
                Start date:30/08/2024
                Path:C:\Users\user\Desktop\rYhL.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
                Imagebase:0xff0000
                File size:961'536 bytes
                MD5 hash:CA4CCB77C304E8074ABD359DD086EDE4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:6
                Start time:01:24:01
                Start date:30/08/2024
                Path:C:\Users\user\Desktop\rYhL.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ybvkuknlzmitkiyc"
                Imagebase:0x4b0000
                File size:961'536 bytes
                MD5 hash:CA4CCB77C304E8074ABD359DD086EDE4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:7
                Start time:01:24:01
                Start date:30/08/2024
                Path:C:\Users\user\Desktop\rYhL.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\idaducgmvuafupugdysz"
                Imagebase:0xd90000
                File size:961'536 bytes
                MD5 hash:CA4CCB77C304E8074ABD359DD086EDE4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:11.2%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:179
                  Total number of Limit Nodes:8
                  execution_graph 50619 3284668 50620 328467a 50619->50620 50621 3284686 50620->50621 50623 3284778 50620->50623 50624 328479d 50623->50624 50628 3284878 50624->50628 50632 3284888 50624->50632 50630 32848af 50628->50630 50629 328498c 50629->50629 50630->50629 50636 328449c 50630->50636 50633 32848af 50632->50633 50634 328449c CreateActCtxA 50633->50634 50635 328498c 50633->50635 50634->50635 50637 3285918 CreateActCtxA 50636->50637 50639 32859db 50637->50639 50640 75b273b 50641 75b29c7 50640->50641 50642 75b2745 50640->50642 50648 75b31a8 50642->50648 50663 75b30e0 50642->50663 50679 75b30d0 50642->50679 50695 75b3100 50642->50695 50710 75b3110 50642->50710 50649 75b314c 50648->50649 50650 75b3132 50649->50650 50725 75b3dbe 50649->50725 50729 75b36ee 50649->50729 50734 75b39a8 50649->50734 50738 75b3599 50649->50738 50743 75b3a6a 50649->50743 50748 75b3dfb 50649->50748 50752 75b3700 50649->50752 50757 75b3951 50649->50757 50761 75b3611 50649->50761 50767 75b38e2 50649->50767 50772 75b3a73 50649->50772 50777 75b36e3 50649->50777 50650->50641 50664 75b30e7 50663->50664 50664->50641 50666 75b309a 50664->50666 50667 75b3dfb 2 API calls 50664->50667 50668 75b3a6a 2 API calls 50664->50668 50669 75b3599 2 API calls 50664->50669 50670 75b39a8 2 API calls 50664->50670 50671 75b36ee 2 API calls 50664->50671 50672 75b3dbe 2 API calls 50664->50672 50673 75b36e3 2 API calls 50664->50673 50674 75b3a73 2 API calls 50664->50674 50675 75b38e2 2 API calls 50664->50675 50676 75b3611 2 API calls 50664->50676 50677 75b3951 2 API calls 50664->50677 50678 75b3700 2 API calls 50664->50678 50665 75b3132 50665->50641 50666->50641 50667->50665 50668->50665 50669->50665 50670->50665 50671->50665 50672->50665 50673->50665 50674->50665 50675->50665 50676->50665 50677->50665 50678->50665 50681 75b30e0 50679->50681 50680 75b309a 50680->50641 50681->50641 50681->50680 50683 75b3dfb 2 API calls 50681->50683 50684 75b3a6a 2 API calls 50681->50684 50685 75b3599 2 API calls 50681->50685 50686 75b39a8 2 API calls 50681->50686 50687 75b36ee 2 API calls 50681->50687 50688 75b3dbe 2 API calls 50681->50688 50689 75b36e3 2 API calls 50681->50689 50690 75b3a73 2 API calls 50681->50690 50691 75b38e2 2 API calls 50681->50691 50692 75b3611 2 API calls 50681->50692 50693 75b3951 2 API calls 50681->50693 50694 75b3700 2 API calls 50681->50694 50682 75b3132 50682->50641 50683->50682 50684->50682 50685->50682 50686->50682 50687->50682 50688->50682 50689->50682 50690->50682 50691->50682 50692->50682 50693->50682 50694->50682 50696 75b3110 50695->50696 50698 75b3dfb 2 API calls 50696->50698 50699 75b3a6a 2 API calls 50696->50699 50700 75b3599 2 API calls 50696->50700 50701 75b39a8 2 API calls 50696->50701 50702 75b36ee 2 API calls 50696->50702 50703 75b3dbe 2 API calls 50696->50703 50704 75b36e3 2 API calls 50696->50704 50705 75b3a73 2 API calls 50696->50705 50706 75b38e2 2 API calls 50696->50706 50707 75b3611 2 API calls 50696->50707 50708 75b3951 2 API calls 50696->50708 50709 75b3700 2 API calls 50696->50709 50697 75b3132 50697->50641 50698->50697 50699->50697 50700->50697 50701->50697 50702->50697 50703->50697 50704->50697 50705->50697 50706->50697 50707->50697 50708->50697 50709->50697 50711 75b312a 50710->50711 50713 75b3dfb 2 API calls 50711->50713 50714 75b3a6a 2 API calls 50711->50714 50715 75b3599 2 API calls 50711->50715 50716 75b39a8 2 API calls 50711->50716 50717 75b36ee 2 API calls 50711->50717 50718 75b3dbe 2 API calls 50711->50718 50719 75b36e3 2 API calls 50711->50719 50720 75b3a73 2 API calls 50711->50720 50721 75b38e2 2 API calls 50711->50721 50722 75b3611 2 API calls 50711->50722 50723 75b3951 2 API calls 50711->50723 50724 75b3700 2 API calls 50711->50724 50712 75b3132 50712->50641 50713->50712 50714->50712 50715->50712 50716->50712 50717->50712 50718->50712 50719->50712 50720->50712 50721->50712 50722->50712 50723->50712 50724->50712 50726 75b3eca 50725->50726 50784 75b1ea8 50726->50784 50788 75b1ea0 50726->50788 50730 75b3ca4 50729->50730 50732 75b1ea8 Wow64SetThreadContext 50730->50732 50733 75b1ea0 Wow64SetThreadContext 50730->50733 50731 75b3cbf 50732->50731 50733->50731 50792 75b203a 50734->50792 50796 75b2040 50734->50796 50735 75b39d5 50739 75b35ab 50738->50739 50800 75b22c8 50739->50800 50804 75b22bc 50739->50804 50744 75b3a6d 50743->50744 50808 75b19b9 50744->50808 50812 75b19c0 50744->50812 50745 75b3a0b 50745->50650 50816 75b1f78 50748->50816 50820 75b1f80 50748->50820 50749 75b3e19 50753 75b3abe 50752->50753 50755 75b203a WriteProcessMemory 50753->50755 50756 75b2040 WriteProcessMemory 50753->50756 50754 75b3b88 50754->50650 50755->50754 50756->50754 50759 75b203a WriteProcessMemory 50757->50759 50760 75b2040 WriteProcessMemory 50757->50760 50758 75b397f 50758->50650 50759->50758 50760->50758 50762 75b3620 50761->50762 50763 75b35b0 50761->50763 50762->50650 50765 75b22c8 CreateProcessA 50763->50765 50766 75b22bc CreateProcessA 50763->50766 50764 75b3658 50764->50650 50765->50764 50766->50764 50768 75b38e8 50767->50768 50824 75b212f 50768->50824 50828 75b2130 50768->50828 50769 75b3855 50773 75b3a79 50772->50773 50775 75b19b9 ResumeThread 50773->50775 50776 75b19c0 ResumeThread 50773->50776 50774 75b3a0b 50774->50650 50775->50774 50776->50774 50778 75b36e6 50777->50778 50779 75b3751 50777->50779 50778->50650 50780 75b3d58 50779->50780 50782 75b19b9 ResumeThread 50779->50782 50783 75b19c0 ResumeThread 50779->50783 50780->50650 50781 75b3a0b 50781->50650 50782->50781 50783->50781 50785 75b1eed Wow64SetThreadContext 50784->50785 50787 75b1f35 50785->50787 50787->50726 50789 75b1ea8 Wow64SetThreadContext 50788->50789 50791 75b1f35 50789->50791 50791->50726 50793 75b2040 WriteProcessMemory 50792->50793 50795 75b20df 50793->50795 50795->50735 50797 75b2088 WriteProcessMemory 50796->50797 50799 75b20df 50797->50799 50799->50735 50801 75b2351 50800->50801 50801->50801 50802 75b24b6 CreateProcessA 50801->50802 50803 75b2513 50802->50803 50805 75b2351 50804->50805 50805->50805 50806 75b24b6 CreateProcessA 50805->50806 50807 75b2513 50806->50807 50809 75b19c0 ResumeThread 50808->50809 50811 75b1a31 50809->50811 50811->50745 50813 75b1a00 ResumeThread 50812->50813 50815 75b1a31 50813->50815 50815->50745 50817 75b1f80 VirtualAllocEx 50816->50817 50819 75b1ffd 50817->50819 50819->50749 50821 75b1fc0 VirtualAllocEx 50820->50821 50823 75b1ffd 50821->50823 50823->50749 50825 75b2130 ReadProcessMemory 50824->50825 50827 75b21bf 50825->50827 50827->50769 50829 75b217b ReadProcessMemory 50828->50829 50831 75b21bf 50829->50831 50831->50769 50607 75b42c8 50608 75b4453 50607->50608 50610 75b42ee 50607->50610 50610->50608 50611 75b0408 50610->50611 50612 75b4548 PostMessageW 50611->50612 50614 75b45b4 50612->50614 50614->50610 50832 7f73a90 50833 7f73a95 FindCloseChangeNotification 50832->50833 50835 7f73aff 50833->50835 50615 7f7af68 50616 7f7afb6 DrawTextExW 50615->50616 50618 7f7b00e 50616->50618
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042226227.0000000007F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F70000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7f70000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 51d505b535c9a7e32fe8c6dbefc77cada449069777dddcb92273279fc5fb5d4b
                  • Instruction ID: c369d9065812b342c6cd36dc17d053bc081d03ccad87fc07518d35726d1848bb
                  • Opcode Fuzzy Hash: 51d505b535c9a7e32fe8c6dbefc77cada449069777dddcb92273279fc5fb5d4b
                  • Instruction Fuzzy Hash: 96A22B71E106598FCB15EF68C8586EDB7B2FF89300F1581A9D80AA7351EB70AE85CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a457bbf682bda6139bb4bd5d80ae2ac05f01584a784f8e7e7b5da4121ffd20da
                  • Instruction ID: 3d3618b405ae7d85598367346c99fd0381ee04f9c50719be3fcacbac65bc091b
                  • Opcode Fuzzy Hash: a457bbf682bda6139bb4bd5d80ae2ac05f01584a784f8e7e7b5da4121ffd20da
                  • Instruction Fuzzy Hash: 61521674715605CFCB19AB78C4A86AD7BF2FF89309F1448AEE606DB3A0DE359841CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2220f979194c6d3b105ad9b9962ce87611af46ebc22dd728bf67d36ecf1a92eb
                  • Instruction ID: ce479efab2241ecf0fc0952b25595c6cda56ba1bb524644819fe0d9dd69cfd88
                  • Opcode Fuzzy Hash: 2220f979194c6d3b105ad9b9962ce87611af46ebc22dd728bf67d36ecf1a92eb
                  • Instruction Fuzzy Hash: 83224B70A10219CFCB14DF68C884A9DBBB2FF85314F558699E509AB365DB30EE85CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 294 92e6120-92e613b 295 92e6142-92e6148 294->295 296 92e614a 295->296 297 92e6151-92e619a 295->297 296->297 298 92e619d-92e61ae 296->298 299 92e62ab-92e62bc 296->299 300 92e6269-92e627a 296->300 301 92e61c6-92e61d7 296->301 302 92e6223-92e6234 296->302 303 92e61e3-92e61f4 296->303 304 92e6200-92e620a 296->304 297->298 306 92e62fc-92e6306 298->306 315 92e61b4-92e61c1 298->315 299->306 321 92e62be-92e62fb 299->321 300->306 317 92e6280-92e6297 300->317 301->306 316 92e61dd 301->316 302->306 314 92e623a-92e6251 302->314 303->306 320 92e61fa 303->320 304->306 307 92e6210-92e621e 304->307 307->295 314->306 326 92e6257-92e6264 314->326 315->295 316->303 317->306 327 92e6299-92e62a6 317->327 320->304 326->295 327->295
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8wq$8wq$LRsq$LRsq$LRsq$$sq$$sq$$sq$$sq$$sq
                  • API String ID: 0-232168420
                  • Opcode ID: 60c58f898955b4d99dbc2b8d2c02c419f94317282b4c22a66ae30046383c2410
                  • Instruction ID: 91172a7a1661cc9198ed14406e432dddd137d0951ee2f469e4e758af973abd51
                  • Opcode Fuzzy Hash: 60c58f898955b4d99dbc2b8d2c02c419f94317282b4c22a66ae30046383c2410
                  • Instruction Fuzzy Hash: F8418FB0A24209DFCB24DB99C994A7FBBB2FF40304F14D46AC0216F361CB329945CB52

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 333 92e5d41-92e5d42 334 92e5d4b-92e5d51 333->334 335 92e5d44-92e5d4a 333->335 336 92e5d53-92e5d78 334->336 335->334 335->336 337 92e5db1-92e5dd6 336->337 340 92e5ddb-92e5de5 337->340 341 92e5dd8 337->341 342 92e5dee-92e5df1 340->342 343 92e5de7-92e5dec 340->343 341->340 344 92e5df4-92e5e06 342->344 343->344 346 92e5d7a-92e5d7d 344->346 347 92e5d7f 346->347 348 92e5d86-92e5d9d 346->348 347->337 347->348 349 92e5ebe-92e5ec3 347->349 350 92e5e4e-92e5e50 347->350 351 92e5e8b-92e5e91 347->351 352 92e5e0b-92e5e1a 347->352 353 92e5ec8-92e5ed1 347->353 354 92e5ed6-92e5edf 347->354 355 92e5f55-92e5f5b 347->355 356 92e5e30-92e5e43 347->356 359 92e5f98-92e5f9e 348->359 368 92e5da3-92e5daf 348->368 349->346 363 92e5e62 350->363 364 92e5e52-92e5e60 350->364 365 92e5e97-92e5ea3 351->365 366 92e5e93-92e5e95 351->366 352->359 360 92e5e20-92e5e2b 352->360 353->346 354->359 362 92e5ee5-92e5ef4 354->362 357 92e5f5f-92e5f6b 355->357 358 92e5f5d 355->358 369 92e5e4c 356->369 367 92e5f6d-92e5f78 357->367 358->367 360->346 362->359 370 92e5efa-92e5f0c 362->370 371 92e5e64-92e5e86 363->371 364->371 372 92e5ea5-92e5eb4 365->372 366->372 381 92e5f7a-92e5f80 367->381 382 92e5f90-92e5f97 367->382 368->346 369->350 370->359 375 92e5f12-92e5f26 370->375 371->346 372->349 378 92e5f3e-92e5f45 375->378 379 92e5f28-92e5f2f 375->379 378->359 384 92e5f47-92e5f53 378->384 379->359 383 92e5f31-92e5f34 379->383 385 92e5f84-92e5f86 381->385 386 92e5f82 381->386 387 92e5f39 383->387 384->387 385->382 386->382 387->346
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: LRsq$LRsq$LRsq$$sq$$sq$$sq
                  • API String ID: 0-1237290977
                  • Opcode ID: 9e4c6221d523312cc1d67bdc3d6091d4191453e06f4c2d599e4f40740e215092
                  • Instruction ID: 0492c74501a2ade78fd19871aead2e6dcc485fecc998f7d2c5b0061427f4ad7f
                  • Opcode Fuzzy Hash: 9e4c6221d523312cc1d67bdc3d6091d4191453e06f4c2d599e4f40740e215092
                  • Instruction Fuzzy Hash: 2E51ACB0E352059FDF148B69D985EBEBBF1EB86344F9484A6F005EB2A2D7748C41CB41

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 388 79fe370-79fe38e 389 79fe3ff-79fe430 388->389 390 79fe390-79fe395 388->390 403 79fe457-79fe462 389->403 404 79fe432-79fe456 389->404 391 79fe3ee-79fe3f5 390->391 392 79fe397-79fe3ae 390->392 396 79fe3c4-79fe3e4 392->396 397 79fe3b0-79fe3b9 392->397 401 79fe3eb-79fe3ec 396->401 465 79fe3bc call 79fe35f 397->465 466 79fe3bc call 79fe440 397->466 467 79fe3bc call 79fe370 397->467 399 79fe3bf-79fe3c2 399->396 399->397 401->391 406 79fe46b-79fe475 403->406 407 79fe464-79fe46a 403->407 404->403 409 79fe47b-79fe494 call 79fc41c * 2 406->409 410 79fe6b1-79fe6dd 406->410 417 79fe49a-79fe4bc 409->417 418 79fe6e4-79fe73d 409->418 410->418 425 79fe4be-79fe4cc call 79fc42c 417->425 426 79fe4cd-79fe4dc 417->426 432 79fe4de-79fe4fb 426->432 433 79fe501-79fe522 426->433 432->433 439 79fe524-79fe535 433->439 440 79fe572-79fe59a 433->440 443 79fe537-79fe54f call 79fc43c 439->443 444 79fe564-79fe568 439->444 463 79fe59d call 79fe7f9 440->463 464 79fe59d call 79fe930 440->464 451 79fe554-79fe562 443->451 452 79fe551-79fe552 443->452 444->440 447 79fe5a0-79fe5c5 454 79fe60b 447->454 455 79fe5c7-79fe5dc 447->455 451->443 451->444 452->451 454->410 455->454 458 79fe5de-79fe601 455->458 458->454 462 79fe603 458->462 462->454 463->447 464->447 465->399 466->399 467->399
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: (wq$Hwq$Hwq
                  • API String ID: 0-3932889812
                  • Opcode ID: b4517cbccf1f30484b67f4e3be001565f217474d7d1dd6bcf2bd6ff3751fba6b
                  • Instruction ID: 65e602c3feaad3d6a708d633241db235a60c0803febf0ba30650184425465aa1
                  • Opcode Fuzzy Hash: b4517cbccf1f30484b67f4e3be001565f217474d7d1dd6bcf2bd6ff3751fba6b
                  • Instruction Fuzzy Hash: CAA16B75B006198FCB14EFA8C5949ADBBF2EF89304F2440A9D905EB361DB35DD41CB61

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 576 79f4040-79f4078 578 79f407a-79f4085 576->578 579 79f40c4-79f40c8 576->579 582 79f408b-79f4091 578->582 583 79f41b9-79f41e5 578->583 580 79f40ce-79f40d0 579->580 581 79f40ca-79f40cc 579->581 584 79f40d3-79f40d7 580->584 581->584 585 79f41ec-79f4229 582->585 586 79f4097-79f4099 582->586 583->585 587 79f40d9-79f40db 584->587 588 79f4102-79f4104 584->588 586->585 590 79f409f-79f40a2 586->590 594 79f40dd-79f40df 587->594 595 79f40e1 587->595 592 79f418b-79f418f 588->592 593 79f410a-79f413b 588->593 596 79f40a8 590->596 597 79f40a4-79f40a6 590->597 600 79f4198 592->600 601 79f4191-79f4196 592->601 609 79f413d-79f4140 593->609 610 79f4142-79f4144 593->610 598 79f40e6-79f4101 594->598 595->598 599 79f40ad-79f40b3 596->599 597->599 603 79f40ba 599->603 604 79f40b5-79f40b8 599->604 605 79f419b-79f41b8 600->605 601->605 608 79f40bf-79f40c2 603->608 604->608 608->584 609->610 615 79f414d 610->615 616 79f4146-79f414b 610->616 618 79f414f-79f415c 615->618 616->618 625 79f415e call 79f4400 618->625 626 79f415e call 79f43d0 618->626 620 79f4164-79f4166 622 79f4168-79f4181 620->622 623 79f4183-79f418a 620->623 622->623 625->620 626->620
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: Hwq$Hwq
                  • API String ID: 0-741242263
                  • Opcode ID: fccd28a8935033f051ad5496d23adf3db286b2195d357f3c93eb5cd785741bef
                  • Instruction ID: cc212e942dd6194d202cb30fccb9bd15d11acd0d0cce8b07f43f9285b8599477
                  • Opcode Fuzzy Hash: fccd28a8935033f051ad5496d23adf3db286b2195d357f3c93eb5cd785741bef
                  • Instruction Fuzzy Hash: D151CC70F0055ACBCF14CBA8C8405AFBBF6FBD9318F244529EA15A3354DB3299528B91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 627 75b22bc-75b235d 629 75b235f-75b2369 627->629 630 75b2396-75b23b6 627->630 629->630 631 75b236b-75b236d 629->631 635 75b23b8-75b23c2 630->635 636 75b23ef-75b241e 630->636 633 75b236f-75b2379 631->633 634 75b2390-75b2393 631->634 637 75b237b 633->637 638 75b237d-75b238c 633->638 634->630 635->636 639 75b23c4-75b23c6 635->639 646 75b2420-75b242a 636->646 647 75b2457-75b2511 CreateProcessA 636->647 637->638 638->638 640 75b238e 638->640 641 75b23e9-75b23ec 639->641 642 75b23c8-75b23d2 639->642 640->634 641->636 644 75b23d6-75b23e5 642->644 645 75b23d4 642->645 644->644 648 75b23e7 644->648 645->644 646->647 649 75b242c-75b242e 646->649 658 75b251a-75b25a0 647->658 659 75b2513-75b2519 647->659 648->641 650 75b2451-75b2454 649->650 651 75b2430-75b243a 649->651 650->647 653 75b243e-75b244d 651->653 654 75b243c 651->654 653->653 655 75b244f 653->655 654->653 655->650 669 75b25a2-75b25a6 658->669 670 75b25b0-75b25b4 658->670 659->658 669->670 671 75b25a8 669->671 672 75b25b6-75b25ba 670->672 673 75b25c4-75b25c8 670->673 671->670 672->673 674 75b25bc 672->674 675 75b25ca-75b25ce 673->675 676 75b25d8-75b25dc 673->676 674->673 675->676 679 75b25d0 675->679 677 75b25ee-75b25f5 676->677 678 75b25de-75b25e4 676->678 680 75b260c 677->680 681 75b25f7-75b2606 677->681 678->677 679->676 683 75b260d 680->683 681->680 683->683
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075B24FE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 8acce6ae739c90b6d7be71f993b3409a0147e2158510bf477d0b855bf7b2e5b5
                  • Instruction ID: bd98b02d9a0def1ffdf7ad511c8491b657414bcf37c76b647a78f7f4d1aa4fb1
                  • Opcode Fuzzy Hash: 8acce6ae739c90b6d7be71f993b3409a0147e2158510bf477d0b855bf7b2e5b5
                  • Instruction Fuzzy Hash: 71A161B1D00219DFDF24DF68C881BEDBBB2BF48310F14856AD859A7280DB759985CFA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 684 75b22c8-75b235d 686 75b235f-75b2369 684->686 687 75b2396-75b23b6 684->687 686->687 688 75b236b-75b236d 686->688 692 75b23b8-75b23c2 687->692 693 75b23ef-75b241e 687->693 690 75b236f-75b2379 688->690 691 75b2390-75b2393 688->691 694 75b237b 690->694 695 75b237d-75b238c 690->695 691->687 692->693 696 75b23c4-75b23c6 692->696 703 75b2420-75b242a 693->703 704 75b2457-75b2511 CreateProcessA 693->704 694->695 695->695 697 75b238e 695->697 698 75b23e9-75b23ec 696->698 699 75b23c8-75b23d2 696->699 697->691 698->693 701 75b23d6-75b23e5 699->701 702 75b23d4 699->702 701->701 705 75b23e7 701->705 702->701 703->704 706 75b242c-75b242e 703->706 715 75b251a-75b25a0 704->715 716 75b2513-75b2519 704->716 705->698 707 75b2451-75b2454 706->707 708 75b2430-75b243a 706->708 707->704 710 75b243e-75b244d 708->710 711 75b243c 708->711 710->710 712 75b244f 710->712 711->710 712->707 726 75b25a2-75b25a6 715->726 727 75b25b0-75b25b4 715->727 716->715 726->727 728 75b25a8 726->728 729 75b25b6-75b25ba 727->729 730 75b25c4-75b25c8 727->730 728->727 729->730 731 75b25bc 729->731 732 75b25ca-75b25ce 730->732 733 75b25d8-75b25dc 730->733 731->730 732->733 736 75b25d0 732->736 734 75b25ee-75b25f5 733->734 735 75b25de-75b25e4 733->735 737 75b260c 734->737 738 75b25f7-75b2606 734->738 735->734 736->733 740 75b260d 737->740 738->737 740->740
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075B24FE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 0f75c0d65969ad84b6155e50e1ef1e3f32ada05e515b0b19e4ac05222780dec5
                  • Instruction ID: cf1869813e1e2ef649225aa540ff4a7e1dd8314c1fb97e3ffef1c11717b6ed27
                  • Opcode Fuzzy Hash: 0f75c0d65969ad84b6155e50e1ef1e3f32ada05e515b0b19e4ac05222780dec5
                  • Instruction Fuzzy Hash: 219150B1D00219DFDF24DF68C881BEDBBB2BF48310F14856AD819A7280DB759985CFA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 741 328449c-32859d9 CreateActCtxA 744 32859db-32859e1 741->744 745 32859e2-3285a3c 741->745 744->745 752 3285a4b-3285a4f 745->752 753 3285a3e-3285a41 745->753 754 3285a60 752->754 755 3285a51-3285a5d 752->755 753->752 757 3285a61 754->757 755->754 757->757
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 032859C9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037739747.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3280000_rYhL.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 2c40f50cb2817e067fe0e2e5bf6d3a45a23659aa3f2152eeb650ef84d8816eee
                  • Instruction ID: 73d46de19227cd23a3d9936caa415a9ebe04e6b09ffde3a9551c4923969ba70d
                  • Opcode Fuzzy Hash: 2c40f50cb2817e067fe0e2e5bf6d3a45a23659aa3f2152eeb650ef84d8816eee
                  • Instruction Fuzzy Hash: 7441D0B0C10619CBDB24DFAAC984BDEBBF5BF49304F64805AD408AB251DB756946CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 758 328590c-32859d9 CreateActCtxA 760 32859db-32859e1 758->760 761 32859e2-3285a3c 758->761 760->761 768 3285a4b-3285a4f 761->768 769 3285a3e-3285a41 761->769 770 3285a60 768->770 771 3285a51-3285a5d 768->771 769->768 773 3285a61 770->773 771->770 773->773
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 032859C9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037739747.0000000003280000.00000040.00000800.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3280000_rYhL.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 5c314786c69abe301dfc6171932bbbe23a62d64e9a14154e0a4c975a192144a7
                  • Instruction ID: 172045a5270140c427baa24c8ba85e45317eab328c67fe9cd8a4ee2e75eb2726
                  • Opcode Fuzzy Hash: 5c314786c69abe301dfc6171932bbbe23a62d64e9a14154e0a4c975a192144a7
                  • Instruction Fuzzy Hash: 0041F1B0C10619CEDF24DFA9C984BDEBBF5BF49304F64806AD408AB251DB756946CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 774 75b203a-75b208e 777 75b209e-75b20dd WriteProcessMemory 774->777 778 75b2090-75b209c 774->778 780 75b20df-75b20e5 777->780 781 75b20e6-75b2116 777->781 778->777 780->781
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075B20D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: c6e51e93c27b8716f047b38ee8742b820684fae92a788df64cc3b28b03deb212
                  • Instruction ID: f1c977136085b7ea911f99f0efb466e37f8cd578cf26c0d5c82e7c45ab99415a
                  • Opcode Fuzzy Hash: c6e51e93c27b8716f047b38ee8742b820684fae92a788df64cc3b28b03deb212
                  • Instruction Fuzzy Hash: AB3147B19003499FCB20CFA9C885BEEBFF5FF48320F10842AE958A7240C7799945DB60

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 785 79f82b8-79f82e5 788 79f82ed-79f82ef 785->788 789 79f82e7-79f82eb 785->789 791 79f850d-79f8519 788->791 789->788 790 79f82f4-79f8309 789->790 793 79f830f-79f8330 790->793 794 79f851c-79f854c 790->794 797 79f8338-79f833a 793->797 798 79f8332-79f8336 793->798 801 79f8716-79f8718 794->801 802 79f8552-79f8558 794->802 797->791 798->797 800 79f833f-79f8348 798->800 800->794 803 79f834e-79f836a 800->803 804 79f855a-79f858c 802->804 805 79f8597-79f859d 802->805 818 79f836c-79f836e 803->818 819 79f8373-79f8388 803->819 804->805 807 79f859f-79f85ba 805->807 808 79f85c5-79f85cb 805->808 807->808 810 79f85cd-79f85e8 808->810 811 79f85f3-79f85f9 808->811 810->811 812 79f85fb-79f865b 811->812 813 79f8666-79f866c 811->813 812->813 820 79f866e-79f86b7 813->820 821 79f86c2-79f86c8 813->821 818->791 825 79f84fe-79f8502 819->825 826 79f838e-79f8396 819->826 820->821 823 79f86ca-79f86e5 821->823 824 79f86f0-79f870b 821->824 823->824 824->801 828 79f8508 825->828 829 79f8504-79f8506 825->829 826->794 830 79f839c-79f83b5 826->830 828->791 829->791 830->794 836 79f83bb-79f83d7 830->836 841 79f83d9-79f83db 836->841 842 79f83e0-79f83e4 836->842 841->791 842->794 843 79f83ea-79f8400 842->843 843->794 845 79f8406-79f842b 843->845 848 79f84b2-79f84c4 845->848 849 79f8431-79f843c 845->849 854 79f84eb-79f84ed 848->854 855 79f84c6-79f84c8 848->855 850 79f843e-79f8442 849->850 851 79f8469-79f848e 849->851 850->794 852 79f8448-79f844f 850->852 866 79f84a0-79f84a5 851->866 867 79f8490-79f849e 851->867 856 79f8456-79f8467 852->856 857 79f8451-79f8454 852->857 854->791 859 79f84ca-79f84d4 855->859 860 79f84d6 855->860 856->851 857->851 857->856 861 79f84db-79f84dd 859->861 860->861 864 79f84ef-79f84f8 861->864 865 79f84df-79f84e9 861->865 864->825 864->826 865->864 866->864 868 79f84a7-79f84b0 866->868 867->866 868->864
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: `Qsq
                  • API String ID: 0-1410074375
                  • Opcode ID: 1bb045ee6566c820d043cc6b5bfe8952c8acea70ed26e25f1f9a79066743129c
                  • Instruction ID: 6c7096cfc7d7e842cec3a8c92041c4023126bbcaa7a1f1540ccafe39c52a6353
                  • Opcode Fuzzy Hash: 1bb045ee6566c820d043cc6b5bfe8952c8acea70ed26e25f1f9a79066743129c
                  • Instruction Fuzzy Hash: DEC1BFB07013069FEB24DB29D480B6ABBA6FF85308F6485A5DA058F2D5DB75DC85CB80

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 870 7f7af62-7f7afb4 872 7f7afb6-7f7afbc 870->872 873 7f7afbf-7f7afce 870->873 872->873 874 7f7afd3-7f7b00c DrawTextExW 873->874 875 7f7afd0 873->875 876 7f7b015-7f7b032 874->876 877 7f7b00e-7f7b014 874->877 875->874 877->876
                  APIs
                  • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07F7AFFF
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042226227.0000000007F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F70000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7f70000_rYhL.jbxd
                  Similarity
                  • API ID: DrawText
                  • String ID:
                  • API String ID: 2175133113-0
                  • Opcode ID: fc9a8c58def96c414c5509633e0a8eaa88c443e2201fc844eef2f5516a4882dd
                  • Instruction ID: 00ecec7f0b67cf2618380a10db81470fb0eba86725f3820aef1ba462f5c69763
                  • Opcode Fuzzy Hash: fc9a8c58def96c414c5509633e0a8eaa88c443e2201fc844eef2f5516a4882dd
                  • Instruction Fuzzy Hash: 9921A5B5D012099FDB10CF9AD884ADEFBF5FB58324F18842AE925A7310D775A544CFA0
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075B20D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 56ed8f726b471284d96a37de077311dc3b825b06e3d496bde852e0da1caa196e
                  • Instruction ID: 5d67983ad28e17dc28b5f06f2a20dc8a8aa8227b9f0a577f20c82b946db927eb
                  • Opcode Fuzzy Hash: 56ed8f726b471284d96a37de077311dc3b825b06e3d496bde852e0da1caa196e
                  • Instruction Fuzzy Hash: C82127B59003499FDB10DFA9C885BEEBBF5FF48320F10842AE919A7340C7799944DBA0
                  APIs
                  • DrawTextExW.USER32(?,?,?,?,?,?), ref: 07F7AFFF
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042226227.0000000007F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F70000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7f70000_rYhL.jbxd
                  Similarity
                  • API ID: DrawText
                  • String ID:
                  • API String ID: 2175133113-0
                  • Opcode ID: 41d503c11df33f804feb0e218a0ddd795fe5841ba0069b72aba6ac6e9f062058
                  • Instruction ID: e15837931f82ebec5c19e45edaaf041e2fcde473c7676988171a9b5793c5fba0
                  • Opcode Fuzzy Hash: 41d503c11df33f804feb0e218a0ddd795fe5841ba0069b72aba6ac6e9f062058
                  • Instruction Fuzzy Hash: 0721A3B5D012099FDB10CF9AD884ADEFBF5FB48324F14842AE919A7310D775A944CFA0
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 075B1F26
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 7cfb9eb539108612e08b324fe8ef811b347b8b5c96ef55f47d7ffde83b049f7a
                  • Instruction ID: af6600d5b67b6a6bfae7e8a47991334d90016f1c5a58ebb4320aba6870608223
                  • Opcode Fuzzy Hash: 7cfb9eb539108612e08b324fe8ef811b347b8b5c96ef55f47d7ffde83b049f7a
                  • Instruction Fuzzy Hash: 8B212AB19003099FDB10DFAAC4857EEBBF4BF88324F14842AE559A7341C778A945CFA1
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075B21B0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 2c8f86e35bdb0a34127250ca5f432be07786df6de6864915cabeff5f60b98f2d
                  • Instruction ID: c5ce3c958602b31e5d1a5f28319ff17e92513b00ab72f8df9c881a0e2767d3e0
                  • Opcode Fuzzy Hash: 2c8f86e35bdb0a34127250ca5f432be07786df6de6864915cabeff5f60b98f2d
                  • Instruction Fuzzy Hash: 53212AB1D003499FDB10DFAAC845AEEBBF5FF88320F10842AE519A7240C7759544DBA1
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 075B1F26
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: b1ff6c108caaa154411236c44949169272850a4909091759ca043e372bbef8f8
                  • Instruction ID: ff1b24161124f3d1f759fe470b6dd81185c368390cf8fe42d7a1787627ad95b3
                  • Opcode Fuzzy Hash: b1ff6c108caaa154411236c44949169272850a4909091759ca043e372bbef8f8
                  • Instruction Fuzzy Hash: 302107B19003098FDB10DFAAC4857EEBBF4AF88324F14842AE559A7241D778A945CBA5
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075B21B0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 2b9d1edd22eda27889de86c35b0b592aac98d3101b8bc9af3443348c6cfd7622
                  • Instruction ID: 0a65dd0ea359df3d364fd5a51cab5a15ce27a2e215f3677b9ce0afb192c5c6b2
                  • Opcode Fuzzy Hash: 2b9d1edd22eda27889de86c35b0b592aac98d3101b8bc9af3443348c6cfd7622
                  • Instruction Fuzzy Hash: 52212AB1D003499FDB10DF9AC845AEEBBF5FF88320F10842AE519A7240C7759544DBA1
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075B1FEE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 63cc555da15e722e5e7f2c44de6a9c5aac86193e1e756acc4ddef3dd17a823a2
                  • Instruction ID: a8ae9a9f123bcdc2158ba3b8c6f46bcc800135c975efe32a46f1334a945f997f
                  • Opcode Fuzzy Hash: 63cc555da15e722e5e7f2c44de6a9c5aac86193e1e756acc4ddef3dd17a823a2
                  • Instruction Fuzzy Hash: 1B216AB28002499BDB20CFA9C845ADEFFF5FF88324F148819E519A7650C775A500CFA0
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 3a5b3fc9c72524980538e4309c914a46b2962e76215bb12b550ab819511b49c0
                  • Instruction ID: 1d2b204dd3c3bf71bc26c1f516ff483bc0527e8e670fa8a9b2e52e5365ad6f84
                  • Opcode Fuzzy Hash: 3a5b3fc9c72524980538e4309c914a46b2962e76215bb12b550ab819511b49c0
                  • Instruction Fuzzy Hash: C911ACB1D043898FCB20DFAAC4457EEFFF4AF88320F24885AD459A7240C679A904CB91
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075B1FEE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 236e22eee79304b5ae84e6e45708d77d890b04c0022cf4ac5746057b386dd8e2
                  • Instruction ID: f4bb58926ce790ec7cb358e265fd3b39ef73d3be7f66b64621b3f2227c40c6dd
                  • Opcode Fuzzy Hash: 236e22eee79304b5ae84e6e45708d77d890b04c0022cf4ac5746057b386dd8e2
                  • Instruction Fuzzy Hash: 59116AB19002499FDB20DFAAC845ADFBFF5FF88320F148419E519A7250C775A500CFA1
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 075B45A5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 5a2de0c9e0a58ad62fbb33f716f476837a6389cb316cd9d974f0e6df603ebc19
                  • Instruction ID: 5de2226a3ea963ac197b828796c44388e94281d66b3c52571ede5cd8b1215893
                  • Opcode Fuzzy Hash: 5a2de0c9e0a58ad62fbb33f716f476837a6389cb316cd9d974f0e6df603ebc19
                  • Instruction Fuzzy Hash: 861116B58003899FDB20CF99C989BDEBFF8FB48324F20885AD954A7641C375A544CFA1
                  APIs
                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,07F73949,?,?), ref: 07F73AF0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042226227.0000000007F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F70000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7f70000_rYhL.jbxd
                  Similarity
                  • API ID: ChangeCloseFindNotification
                  • String ID:
                  • API String ID: 2591292051-0
                  • Opcode ID: f611d3a5632184b5328d95de893fae2af89044b82ed24fc5a5280a07ac4e622e
                  • Instruction ID: 5d9841e5da52bf1ee8837be161e6b0030f76976f2c6b2f80eb76ece7582dd070
                  • Opcode Fuzzy Hash: f611d3a5632184b5328d95de893fae2af89044b82ed24fc5a5280a07ac4e622e
                  • Instruction Fuzzy Hash: 3B1128B58003499FDB10DF9AC445BDEBBF4EF48320F14841AD959A7340D378A944CFA5
                  APIs
                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,07F73949,?,?), ref: 07F73AF0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042226227.0000000007F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F70000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7f70000_rYhL.jbxd
                  Similarity
                  • API ID: ChangeCloseFindNotification
                  • String ID:
                  • API String ID: 2591292051-0
                  • Opcode ID: acf75e861c4495d0c767321fc5032114cf5c7c8a724cf3e963bcf4b55483cbb1
                  • Instruction ID: 20ec07528622f2f034816240b49982559edee82002f6a4b01699a849655870a7
                  • Opcode Fuzzy Hash: acf75e861c4495d0c767321fc5032114cf5c7c8a724cf3e963bcf4b55483cbb1
                  • Instruction Fuzzy Hash: C61155B58003499FCB20DF9AC845BDEBBF4EF48320F24851AD468A7780D738A544CFA1
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: a452042371bf2267c45d375766e97e04fac8b02f8a78713121362283ede0833a
                  • Instruction ID: 23ca6c88bbd729d0710da75e1988f5750e87153a62e12795219ac2644d7c979a
                  • Opcode Fuzzy Hash: a452042371bf2267c45d375766e97e04fac8b02f8a78713121362283ede0833a
                  • Instruction Fuzzy Hash: 481128B1D003498BDB20DFAAC4457EEFBF9AB88324F24841AD519A7340CA756944CB91
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 075B45A5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 3f6765cdaa12fb1cb93a1338d42ec3d944d6185b7be500dd7b13c5334f260459
                  • Instruction ID: d276c62aef33e84804aca99419f4a824efa1ae7229b5478043617acabe429209
                  • Opcode Fuzzy Hash: 3f6765cdaa12fb1cb93a1338d42ec3d944d6185b7be500dd7b13c5334f260459
                  • Instruction Fuzzy Hash: 951125B58003499FCB20CF8AC884BEEBBF8FB48320F10841AE954A7341C375A944CFA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: (wq
                  • API String ID: 0-1062398946
                  • Opcode ID: 0c69a201fa80139bd63886260a190642c80551229fbe8ba04bf668be42e818f6
                  • Instruction ID: 2587f7c84dd68a49e5f8583e7d94cc434ac50808c305b8314d9e60a5d304678d
                  • Opcode Fuzzy Hash: 0c69a201fa80139bd63886260a190642c80551229fbe8ba04bf668be42e818f6
                  • Instruction Fuzzy Hash: 1D71D1B1E10209AFCF05DFA9D980ADEBBF6FB88310F54812AF915A3210D771A951CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: Q
                  • API String ID: 0-3463352047
                  • Opcode ID: fe3ea2c6836dd087e68335b3f6bc000f9e2d4782f47ea49f8b1bda1853c0be31
                  • Instruction ID: 48167fea02ce1ae69325716c39ca2b90d53fb03c25317a311dec23b1f5862866
                  • Opcode Fuzzy Hash: fe3ea2c6836dd087e68335b3f6bc000f9e2d4782f47ea49f8b1bda1853c0be31
                  • Instruction Fuzzy Hash: BA510570F102159FDB14DBA8DC81BBEB7BABF84310F549426F5519B384DB749842CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: (wq
                  • API String ID: 0-1062398946
                  • Opcode ID: fe5c1537947f40c96c6090392d48338935db71a39d1fa01622a633f17a6eaad0
                  • Instruction ID: 091e83a3a5bab2893d2354eff4b038afef58dc4b89557a5e193b69aad99f6ec0
                  • Opcode Fuzzy Hash: fe5c1537947f40c96c6090392d48338935db71a39d1fa01622a633f17a6eaad0
                  • Instruction Fuzzy Hash: 8541F070B046048FCB04EBB8D454BAEBBF6EFC5214F05406AD609DB3A0DB709D45CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tesq
                  • API String ID: 0-136783293
                  • Opcode ID: 32ac2ec3909de314d8c0375a17df72521fe643bd109c32005d1f1f9d1ecb0653
                  • Instruction ID: b53c7d6413ec6541a2e3b0f4d3506304bf569cf60224917f354493246c7398a7
                  • Opcode Fuzzy Hash: 32ac2ec3909de314d8c0375a17df72521fe643bd109c32005d1f1f9d1ecb0653
                  • Instruction Fuzzy Hash: 27418FB4E152488FEB05CFAAC9946EDBFB6AF89300F14C06AD408AB3A5DB705845CF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tesq
                  • API String ID: 0-136783293
                  • Opcode ID: 74ef8d9fa7357731e26d915cbb7b8a06efe453ce59f3ec015722ce27b2e5a767
                  • Instruction ID: 81004c9375b70ff8d3e781823059a4916adf19f24e30352966b68311f0ff06b7
                  • Opcode Fuzzy Hash: 74ef8d9fa7357731e26d915cbb7b8a06efe453ce59f3ec015722ce27b2e5a767
                  • Instruction Fuzzy Hash: 2F31C0B5E11219DFDF08CFAAD580AEDBBB2FF88301F608029E919AB251D7309945CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8wq
                  • API String ID: 0-1015343481
                  • Opcode ID: e59a29172ffcd596a03d25613f36fb71a34f5d3e3e71d84758798ed3abcba7b9
                  • Instruction ID: 82011b7fc661ec0e2bef4fd53563b30ad7a552be9ca54fabbc358bfbd42ca5ad
                  • Opcode Fuzzy Hash: e59a29172ffcd596a03d25613f36fb71a34f5d3e3e71d84758798ed3abcba7b9
                  • Instruction Fuzzy Hash: 9731E1B0E2020ADFEB04CF68C9D5ABEBBB1EB55354F50446AE109EB381D7709D45CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tesq
                  • API String ID: 0-136783293
                  • Opcode ID: c201fcaef00b24292da0052cfaa221c08339a5ac5a7a5ca7ceca342998a5624e
                  • Instruction ID: 17729feec0d1986f10d33a0d86fea0729903277f8e41918adbabccda80747717
                  • Opcode Fuzzy Hash: c201fcaef00b24292da0052cfaa221c08339a5ac5a7a5ca7ceca342998a5624e
                  • Instruction Fuzzy Hash: B121E6B4E142488BEB08DFAAC9546EEFBF6BF89300F10C02AD419AB354DB705906CF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tesq
                  • API String ID: 0-136783293
                  • Opcode ID: 0bf9ee6454f7ff8a696d9d99e8fc4a7d29577f7f1156077651c722acb6db6348
                  • Instruction ID: 20c7299d8e5270f439bbfe9f017da654beffdb8f45bdbee995fb31297d24f2ee
                  • Opcode Fuzzy Hash: 0bf9ee6454f7ff8a696d9d99e8fc4a7d29577f7f1156077651c722acb6db6348
                  • Instruction Fuzzy Hash: 1E21ED79E15209CFDF08CFE9C8809EDBBB6FB89341F60812AD919AB254C7319906CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tesq
                  • API String ID: 0-136783293
                  • Opcode ID: 2ca7a3af3e7b5df096a86610757389ecd2dff627baff46310c9655850b67fec7
                  • Instruction ID: 161caffd572c84effddd944911c72b19ead7860a7cd7951eb0a1f02b385d440d
                  • Opcode Fuzzy Hash: 2ca7a3af3e7b5df096a86610757389ecd2dff627baff46310c9655850b67fec7
                  • Instruction Fuzzy Hash: EE111C75B1121A8BCF14EBBAD9505EEB7F6BBC8311B50406AD505E7344EB328E11CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'sq
                  • API String ID: 0-1075809040
                  • Opcode ID: 27047bd2fbbd18a8cc6c33e157f32e1df675f4d5201405ac38df7b4a84837b25
                  • Instruction ID: 0f4744c9b87dbac2ad4c7bfccbcf31516f61903fbe0c7c2996bd7fc3d07d1272
                  • Opcode Fuzzy Hash: 27047bd2fbbd18a8cc6c33e157f32e1df675f4d5201405ac38df7b4a84837b25
                  • Instruction Fuzzy Hash: 931161B0A093499FCB05EFB8E495A9C7FB1FF95204F1045AAE846DB291EE305A04CF51
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: @
                  • API String ID: 0-2766056989
                  • Opcode ID: 9ba99159571e97492c6d8e38a1e03a408f9acb140452b71f9d23098b048a8d34
                  • Instruction ID: 6645863cec8de1bd29c59b5777d40852e35949acc11e95b5f50820c05a4520ae
                  • Opcode Fuzzy Hash: 9ba99159571e97492c6d8e38a1e03a408f9acb140452b71f9d23098b048a8d34
                  • Instruction Fuzzy Hash: 61F0373093F244DBDB08CB66C4C05F9BBBEBB8A380B88E0A8D40A56196C7B54842CB00
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'sq
                  • API String ID: 0-1075809040
                  • Opcode ID: 67ab3d6109246dd42d52265e812724ef9ad97da92899d3a05d8ea7f8e8040f0b
                  • Instruction ID: 18d8c81db8f4ea2b38eaecb980dfa83e7e9e787d25c566cf868584683872fe3b
                  • Opcode Fuzzy Hash: 67ab3d6109246dd42d52265e812724ef9ad97da92899d3a05d8ea7f8e8040f0b
                  • Instruction Fuzzy Hash: 7CF019B0A15209DFCB08EFB8E59596DBFB1FF89205B1045A9E805E7384EE301E448F51
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: jRD
                  • API String ID: 0-1128082875
                  • Opcode ID: 6879d5e17cc281c3a77eae69ef2f594b0601fbc8002105a61002360c965e6ca7
                  • Instruction ID: 32533a8168f4def7f11b0cd39a2023852b822c5aabce6e551c99d432f70b56b9
                  • Opcode Fuzzy Hash: 6879d5e17cc281c3a77eae69ef2f594b0601fbc8002105a61002360c965e6ca7
                  • Instruction Fuzzy Hash: A0D0C93215420C9B9B40EA94E840D52B7D9AB14600744C436F50887121E621E835D7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: V
                  • API String ID: 0-1342839628
                  • Opcode ID: 29f778a9a91d69d8f4cac350ad5045d35a1d7fe67599388c3275ff28d5b42fd4
                  • Instruction ID: 6ca5ea434c54b4b46461123cb0647dc7cbf7eec674175fd2dc058be16b79539c
                  • Opcode Fuzzy Hash: 29f778a9a91d69d8f4cac350ad5045d35a1d7fe67599388c3275ff28d5b42fd4
                  • Instruction Fuzzy Hash: 93C0926254E7C12FD7039228A9610E4FFB66D1322035F46C7C0888BA63C119689AC7A5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 94f41d33360836342e5ac04d3e52b2ac51156793302dbec0b35ec6a572843d15
                  • Instruction ID: 5e00221b98107a6e33be7ac2609b570a4c3f3bbd5dc7440862459e264de8dc7d
                  • Opcode Fuzzy Hash: 94f41d33360836342e5ac04d3e52b2ac51156793302dbec0b35ec6a572843d15
                  • Instruction Fuzzy Hash: DD224B70A10615CFCB14DF69C884B9DBBB6FF89304F5486A8E90AAB361DB70AD45CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 70443733b3c3db4157aa7c0fe7ba352f77f4db00b56ea2da43459ac35841a91b
                  • Instruction ID: b5d526a67fdb1753b0f2fc408d1b4271f2fae1ec2f31df77c845643ea9499fac
                  • Opcode Fuzzy Hash: 70443733b3c3db4157aa7c0fe7ba352f77f4db00b56ea2da43459ac35841a91b
                  • Instruction Fuzzy Hash: ACE15DF0B0071287CB59AA7D88E011DAAE6EFD9204358D97D9A0E9F35BDE68CC090794
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e6b51dfdd543dac224a8c9c10e6e3d269aee9302da32e28a2a2f678a2b859781
                  • Instruction ID: 16e35cefe4767ea0cd0432b22188850cc94966b98547d2f19121d9b225140948
                  • Opcode Fuzzy Hash: e6b51dfdd543dac224a8c9c10e6e3d269aee9302da32e28a2a2f678a2b859781
                  • Instruction Fuzzy Hash: 3CE14DF1B0071287CB59AB7D88E011DAAE6EFD9204358D97D9A0F9F35BDE68CC090794
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c12c79a2c5a11c1782f15ddca933a5c6897d45fb90b1d413cdb1023bd16201e2
                  • Instruction ID: da4563b982f2e70d275a52905080989d53e0c5d4cd2381549367338f8c10d730
                  • Opcode Fuzzy Hash: c12c79a2c5a11c1782f15ddca933a5c6897d45fb90b1d413cdb1023bd16201e2
                  • Instruction Fuzzy Hash: EE020A74A10219CFCB24DF68C884A9DBBB2FF85314F558599E909AB365DB30ED81CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2ee08d4f27d943fcb1dbc74bae4746eb6a4c5f6a345b54bcc01054e7046f303a
                  • Instruction ID: 267ca4141ce60eb44261a19971f9f5505517d2b23505962986f57637b559d50d
                  • Opcode Fuzzy Hash: 2ee08d4f27d943fcb1dbc74bae4746eb6a4c5f6a345b54bcc01054e7046f303a
                  • Instruction Fuzzy Hash: BEF1D4B4A0064ADFCB14DFA9C9849AEBBF5FF89314B108569E915EB360D730ED41CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4d764e6b9312bc6ea777741d1ac572387cd3bd237933e11a7ee061bbc9d7de34
                  • Instruction ID: a39a212b4aebc0539f603bda05c347d6706ea3b7a06abc3d41d7758b169018c7
                  • Opcode Fuzzy Hash: 4d764e6b9312bc6ea777741d1ac572387cd3bd237933e11a7ee061bbc9d7de34
                  • Instruction Fuzzy Hash: C6E125B4715605CFCB299F78C468BAD7BF6FF8A209B1444AEE616CB360DB359841CB01
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 248b6493d229f23bc6924fa6110bbd38e5d1fc576b817d16df50bff9a3c5a548
                  • Instruction ID: 6bb39a560906b7fe570c458cfa61e94b5065e5a741586c1ab3fffc30e14f73ca
                  • Opcode Fuzzy Hash: 248b6493d229f23bc6924fa6110bbd38e5d1fc576b817d16df50bff9a3c5a548
                  • Instruction Fuzzy Hash: D2C1F3B1A04246CFC711CF68C88066FBBF5FF85314B14C96AD559CB662DB30E986CBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8d81d0d83d04f7df6e9bef5bdb77a7b9560cd217ef3a6c66f120505544d73298
                  • Instruction ID: 2935dd13d7363645189e7cf73e5cae6a83f74667f4cafeec57abf4e9d7e83255
                  • Opcode Fuzzy Hash: 8d81d0d83d04f7df6e9bef5bdb77a7b9560cd217ef3a6c66f120505544d73298
                  • Instruction Fuzzy Hash: EBB137B5B102158FDB18DF68C4A8AADBBF6BF89704F1540A9E505EB3A1CB70EC41CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8a5e33a6538b631917ac59fb6752d096d05ca42b5b5375e45eaa4ac27bbc489e
                  • Instruction ID: 3b434a2c32b2ccd81305f8fe0ca5b03d11b6cd38ae05fb901faf17b509cc6b3f
                  • Opcode Fuzzy Hash: 8a5e33a6538b631917ac59fb6752d096d05ca42b5b5375e45eaa4ac27bbc489e
                  • Instruction Fuzzy Hash: B9A14E74A007189BCB14DF64C8507AEBBB5FF89300F14859AE949A7351EB709D86CF91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0146fbe6cfb3eef293da13d949e2f1da032662f9d2cb291d0ea1df7097ab8295
                  • Instruction ID: ea6142e6d02913fc73235a95a07ebdda3227f9921db5462d0270d5148d65b6cc
                  • Opcode Fuzzy Hash: 0146fbe6cfb3eef293da13d949e2f1da032662f9d2cb291d0ea1df7097ab8295
                  • Instruction Fuzzy Hash: E981D375710611CFCB18DB28D4989697BFAFF89B05B1541A9EA02CB3B2DB71EC41CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7f44538ac494acbc1bb20ed279686b548063073949c7f766c660f63a219e45f5
                  • Instruction ID: 997dc62d6d2549266779d7d4063d985f0f4c7bc21f2c3940fd07373259954a29
                  • Opcode Fuzzy Hash: 7f44538ac494acbc1bb20ed279686b548063073949c7f766c660f63a219e45f5
                  • Instruction Fuzzy Hash: 406159B03007519BD318EB788490B6AB6E3FFC9704F54C82D965A9B390DF75AC429BA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 02d1f056974fc1762a36dd74edb4db35886187f7b382acd91bc82f4d538a211f
                  • Instruction ID: 423866b68965862d384d608fe3643381ae633a0bbed0e6a25dff244266d42db1
                  • Opcode Fuzzy Hash: 02d1f056974fc1762a36dd74edb4db35886187f7b382acd91bc82f4d538a211f
                  • Instruction Fuzzy Hash: 26616AB03007519BD318EB78C490B6AB6E3FFC9304F54882D965ADB390DF75AC429BA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c58bc5a89a6fe1e8a4dd510e1f00d4950f2c840c39dda9fd0b2c0fbe0423425f
                  • Instruction ID: 81c6dc4f33d32db9fdc7e444d0be98ebaeca573427de3f30a9d9bc5604c742de
                  • Opcode Fuzzy Hash: c58bc5a89a6fe1e8a4dd510e1f00d4950f2c840c39dda9fd0b2c0fbe0423425f
                  • Instruction Fuzzy Hash: 8C91FC31900619CFDB10EF68C884A99F7B5FF49310F15C6D9E9497B225EB30AA85CF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ec6385b399ea872f4539a797101b34761cba51ebd9a74651ba0dbd0ad0982c4b
                  • Instruction ID: 95941b1370990d5b685c71df759136a9905b7cf09fd9050dfa34c4dfc3e4395b
                  • Opcode Fuzzy Hash: ec6385b399ea872f4539a797101b34761cba51ebd9a74651ba0dbd0ad0982c4b
                  • Instruction Fuzzy Hash: 94912B75910719DFDB14DF64C840BAEBBB5FF89300F14819AE849A7251EB70AE82CF91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 869946e8ff692536ea57bc4841814c1789903390d1b94ee0084a570b6a916683
                  • Instruction ID: 9e9b15648e3f2984906c95b9a834e40448b8531c5d276bad65973d17379b09af
                  • Opcode Fuzzy Hash: 869946e8ff692536ea57bc4841814c1789903390d1b94ee0084a570b6a916683
                  • Instruction Fuzzy Hash: E2719B706007408FCB19DF79C894B9DBBB6BF8A314F0546B9D5469B3A2DB70AC49CB60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a48708f632ab4c1fd54c2a94774e3042c4bf5ab58e72176cbd21970bc5af929e
                  • Instruction ID: 17c8dd410c98fe2d24df9cac29de155a1bb9cfdfff4fd127f9b08163f3e52a0b
                  • Opcode Fuzzy Hash: a48708f632ab4c1fd54c2a94774e3042c4bf5ab58e72176cbd21970bc5af929e
                  • Instruction Fuzzy Hash: F5518B747042058FDB18DB68C858AADBBFAFF89614B1544ADD906EB361DB35EC01CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5c793331f20bf25c798881f22906ee1639f01018099c1bd26acba1217dbb368d
                  • Instruction ID: 8e9352128d4797ee6717a9c0cfe91968ebea70820d55752c483ce6a29ba00489
                  • Opcode Fuzzy Hash: 5c793331f20bf25c798881f22906ee1639f01018099c1bd26acba1217dbb368d
                  • Instruction Fuzzy Hash: 6C71D4B5E0020A8FCB14DFA9C484BAEFBF6BF48314F14856AE519E7351E774A941CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e1485aa8bc28d74b4ec48b771c4741f9d936ccffc59fd21b2318cf6f82fa38f
                  • Instruction ID: 1b9e0f06a5a70b7800b28802d8f1a68ae890e4e6b45171776eca8a625658bf06
                  • Opcode Fuzzy Hash: 1e1485aa8bc28d74b4ec48b771c4741f9d936ccffc59fd21b2318cf6f82fa38f
                  • Instruction Fuzzy Hash: 32515B71B29245DFC7289F78988462ABBA5BF86750F54847FE186DB241D7708840CB92
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ce8fa982d3d9cb83c384c00d6a250f834b4a782d0cb8d7790bbc16483f1a01c5
                  • Instruction ID: e1a84f34103752b1746d80aadf8c4b34f72fab772ea35cf7499936afd487f3a6
                  • Opcode Fuzzy Hash: ce8fa982d3d9cb83c384c00d6a250f834b4a782d0cb8d7790bbc16483f1a01c5
                  • Instruction Fuzzy Hash: D4615F30A10619CFDB14DFA8D8989AEFBB5FF89300F14856EE546A7354EB30A945CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 37745ee633102af26522068b54d5fa485d2b218bbef489892143a6b856818723
                  • Instruction ID: 2a891de1956596f4ec3f0384ff8665fac70a3d2d4c865622c5aae9220bc4500b
                  • Opcode Fuzzy Hash: 37745ee633102af26522068b54d5fa485d2b218bbef489892143a6b856818723
                  • Instruction Fuzzy Hash: 9E711A3591060ADACF10DFA5C8805AEFBB5FF48310F10C55AE958AB221EB31E996CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 63a49a66aaf0c4159fbda976843a1df9076205cce869654e04dc02f4bd55f4de
                  • Instruction ID: 286526e8ae78f095231cec490a2244d36252576af81c739e4aba865a6690eb19
                  • Opcode Fuzzy Hash: 63a49a66aaf0c4159fbda976843a1df9076205cce869654e04dc02f4bd55f4de
                  • Instruction Fuzzy Hash: B8616130A10609CFDB14DFA8D8989AEFBB5FF89300F10852EE546A7354EB30A945CF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cdf651419560a96e32ff3533c099f6f2984217cf33e730fd5b2ea69ae9573592
                  • Instruction ID: ea26f896af515369c1f56c6ea8d496a81a86e8f699690f5247f72fc145debb92
                  • Opcode Fuzzy Hash: cdf651419560a96e32ff3533c099f6f2984217cf33e730fd5b2ea69ae9573592
                  • Instruction Fuzzy Hash: 3D711C3591071ADACF10DFA5C8805AEFBB5FF48314F10C55AED58AB221EB31E996CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: feb88b44c0bc164af666d159d50e25a7b74b463be399f65a9ecd1ce458a66b81
                  • Instruction ID: b091ab584fe385cfc4ac4c3d99076d0be8970f629c5e06c0eed4d3e2759279fe
                  • Opcode Fuzzy Hash: feb88b44c0bc164af666d159d50e25a7b74b463be399f65a9ecd1ce458a66b81
                  • Instruction Fuzzy Hash: 846192B4E0160A9FCB54DFA9C884A9EFBF6BF48314F14852AE519E7350E770A941CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3ee44e25ad8530588aa0f5fbee8e3205a3a97c228e7e296b6d3c158bedeef115
                  • Instruction ID: 89fe3ea09015107dd8a30c05d781728f971ee058b6994e3d8f93593c224b205b
                  • Opcode Fuzzy Hash: 3ee44e25ad8530588aa0f5fbee8e3205a3a97c228e7e296b6d3c158bedeef115
                  • Instruction Fuzzy Hash: 5651A375A102598FCB14DFADC8846AFBBFAEFD8310F54882AD515E7340DB349901CBA5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 89a84861f2c3fc0c5110602d5d16525c08189b2f8df4d9cd371fc5c025924f9d
                  • Instruction ID: c71d23c5e8f1154c7ebaea6cb002c643990db362075afb83cdaafba02be5b5df
                  • Opcode Fuzzy Hash: 89a84861f2c3fc0c5110602d5d16525c08189b2f8df4d9cd371fc5c025924f9d
                  • Instruction Fuzzy Hash: DC51C671A22205DFDF14CFA8DD94ABEBBBAFB48340F448466F501AB281D7749C41CB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 50b56c4f007ea6c9a8589d9cd2b1434fe72f62b9733914c3122cd042c5fe2a17
                  • Instruction ID: 821804c015b92dedc17b1bc6e14464d92f78dbb04dbd95fc09a1616306ca17db
                  • Opcode Fuzzy Hash: 50b56c4f007ea6c9a8589d9cd2b1434fe72f62b9733914c3122cd042c5fe2a17
                  • Instruction Fuzzy Hash: 4C5125A282F3E15FDB0B5B3848B10D57F709E5321974A04CBD5C0CF0A3E92A491EE7A6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3aa0a6983653c737c534c5d047c41aba213a61713451a894129f6df3109dc8fd
                  • Instruction ID: 472478b8bd4500851c9548fd73b069a547b575185f56bf1d562bae3f4da93a2b
                  • Opcode Fuzzy Hash: 3aa0a6983653c737c534c5d047c41aba213a61713451a894129f6df3109dc8fd
                  • Instruction Fuzzy Hash: 4C41A0B2A01615CFCF05DFA8E4848EEB7BAEF85714B15806AE905BF261D771ED05CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6f5c79a47454b3e827a9dbec4cc24fa72a3895e0c53b6d3d74f83f14888f0df8
                  • Instruction ID: 3a5f61b16df02f6eed4b3f6988539408069575ed479b7dde205d98051f116da9
                  • Opcode Fuzzy Hash: 6f5c79a47454b3e827a9dbec4cc24fa72a3895e0c53b6d3d74f83f14888f0df8
                  • Instruction Fuzzy Hash: B34160B5A0021DCBDF28EFB4C4543ED7AB6DF8A325F14982AD501A7390CB748945CBA5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b34d1023a09666626ea5c3bbf94917be24a23f24f5c385449db421c13a6d24b9
                  • Instruction ID: da545126207a37de6fa498436e69f787a7a8fd1a17a46401237d11ca09d19f78
                  • Opcode Fuzzy Hash: b34d1023a09666626ea5c3bbf94917be24a23f24f5c385449db421c13a6d24b9
                  • Instruction Fuzzy Hash: F5413A74D292098FDB48CFAAD5806EEFBF6AF88340F98D02AE419A2251D7744941CF54
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1d90c71edba2e03a9c6c6d4a3277124bb22467a1053fcd4b1470c3b457adbc28
                  • Instruction ID: 93f2e84ffce241dfdf6e77c6cabc574834e210540662e03f6699e19284b1e284
                  • Opcode Fuzzy Hash: 1d90c71edba2e03a9c6c6d4a3277124bb22467a1053fcd4b1470c3b457adbc28
                  • Instruction Fuzzy Hash: 96318375700209CFCB14DB7DC8446AD77E5EF8A725B1445A9E61ACB3A0DB31EC41CB60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f75d684e12cb7579d64cbb43b9d6038b60e81642d00bf029892371896f016ce
                  • Instruction ID: e41cd14b55a6882cd29b836561ca4631e979667ac173a39359a0fabf309c5bf8
                  • Opcode Fuzzy Hash: 8f75d684e12cb7579d64cbb43b9d6038b60e81642d00bf029892371896f016ce
                  • Instruction Fuzzy Hash: 444190F4A12209EFEF14DFA4D985AAD7BB5FB88341F10966AE40AAB341DB305D51CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ddfa11f1da5938225c9afaf3317d1357bb9a5dcceaa9ce6e108f9975f8634b71
                  • Instruction ID: 41dc05a82f61a7879565cae47880bcc8e895253db05e521f372aa4e35db5918e
                  • Opcode Fuzzy Hash: ddfa11f1da5938225c9afaf3317d1357bb9a5dcceaa9ce6e108f9975f8634b71
                  • Instruction Fuzzy Hash: ED417C71E1064A8BCF00DFE5C9946EDFBB1FF88311F50866AD415BB200DB71AA85CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0c6177804aea2cf64254997652557b9c0467b743be1a224086164d5358234dc7
                  • Instruction ID: 4f0b977d56b1ee40660891dd12e2c21b555846a267f7e5e8e001cfdad76210c4
                  • Opcode Fuzzy Hash: 0c6177804aea2cf64254997652557b9c0467b743be1a224086164d5358234dc7
                  • Instruction Fuzzy Hash: 81410374E25109DBCB00CF98E984AEEFBB5FF98350F84D169E815A7281D730A954CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9e71d46090071796f7ee00d1f958f1bedf0cdfb9f6053fc83681eaa678298e68
                  • Instruction ID: 5720ae0e4d86852c668d3be15920a4928650c37d2ecd6923086637bd90bdce77
                  • Opcode Fuzzy Hash: 9e71d46090071796f7ee00d1f958f1bedf0cdfb9f6053fc83681eaa678298e68
                  • Instruction Fuzzy Hash: DF2107767093558FCB49AB78942477DABE7DFC5210F14406ADA09DB391DE388C028796
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 70cb4d7c4d627ee5a7e857017ec55c01e14e63b17b1a1de0e9757770e7ad78bb
                  • Instruction ID: cb9a06943af44d99b354a6460dcd956f85f64ef9364042611c5efc4baa2b0114
                  • Opcode Fuzzy Hash: 70cb4d7c4d627ee5a7e857017ec55c01e14e63b17b1a1de0e9757770e7ad78bb
                  • Instruction Fuzzy Hash: 46414A34D2521ACFDB20DFA8C5C5AADBBB5FF49340F919199E845A7352D730A881CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 16adae4f0eb0c1803217e8b857c82f00e8f585a55f141c56749475281b6d66b7
                  • Instruction ID: 7a257d7df262dfa99c67c405daa86c71dc1ff4c0a1e4a070be2337b0fad40af6
                  • Opcode Fuzzy Hash: 16adae4f0eb0c1803217e8b857c82f00e8f585a55f141c56749475281b6d66b7
                  • Instruction Fuzzy Hash: 6E317AB4D292098FDB48CFABD4802FEBBF6AF89340F88D02AE418A3251D77449418F50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 631b6cc56eca2ccf77bad33f36536d2ab467b35186895c6b6b2c39e4ec4845e1
                  • Instruction ID: 507200f3014934960b6ef98204ed1d48360e7daeb9ecc7f342057dcfb0441cdf
                  • Opcode Fuzzy Hash: 631b6cc56eca2ccf77bad33f36536d2ab467b35186895c6b6b2c39e4ec4845e1
                  • Instruction Fuzzy Hash: E331E5B5A2A206CFC7148FA8D9C46BAFBB4FB06750F84416BE195D7281C3749944CB92
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2b691767977d6aa176b2faba603d3c5af8224753f19ce916f54f4bc88bd71a99
                  • Instruction ID: cec960f8d40100fe950260b2c90ca7c9d5d117af6b01d58905c455945ba0eb87
                  • Opcode Fuzzy Hash: 2b691767977d6aa176b2faba603d3c5af8224753f19ce916f54f4bc88bd71a99
                  • Instruction Fuzzy Hash: BF31A2B4D0020DCFDF28EFB584503EE7AB6DF8A318F14982AC501A6390DA798945CBA5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2c4dab291475809e6be4581b523b2701e91023639b744c42e93d704a2bbf5f68
                  • Instruction ID: dcdb36f476cd657571d9d992835d3430f93cbdca64eaf67a4a948ecd5320a121
                  • Opcode Fuzzy Hash: 2c4dab291475809e6be4581b523b2701e91023639b744c42e93d704a2bbf5f68
                  • Instruction Fuzzy Hash: F921C7357242048FDB189B7CA89DA7A7BE6EB89359F14453AF406C7385DE788C02C751
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: afedb9c987cb318d7017666acf8946b36c742f67f291efcc88427e28c716433a
                  • Instruction ID: d279e264fc1f1e149340cf3348a535f8852953d95458b8618e2c21b984eddcbd
                  • Opcode Fuzzy Hash: afedb9c987cb318d7017666acf8946b36c742f67f291efcc88427e28c716433a
                  • Instruction Fuzzy Hash: CC31F0B57501048FCB04CF68C598AADBBF6FF89614B2904A9E606EB371CA71AC00CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2a61527c673982c59b09ea822d6cc388ce28893b2bbe906ea1bb262ff5991d59
                  • Instruction ID: 3b9542750fbe139d974c16f011a05171d39dbcc5ea554a0d54b97af6b6e0a8b3
                  • Opcode Fuzzy Hash: 2a61527c673982c59b09ea822d6cc388ce28893b2bbe906ea1bb262ff5991d59
                  • Instruction Fuzzy Hash: 25314AB5D01219DFCB14DFA8D885AEEBBF5FF48310F108A2AE819A7391D7309941CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4cf119130a8ab32624ed4802dc6231904d9a4b23c12612a6f29cfc2137492e16
                  • Instruction ID: 8a6392edf18a70e72cd9c39b0c4a94c3287465ec435430f41727dca546e570c5
                  • Opcode Fuzzy Hash: 4cf119130a8ab32624ed4802dc6231904d9a4b23c12612a6f29cfc2137492e16
                  • Instruction Fuzzy Hash: 803133B1900209AFCF10CF99C980AEEBFF5FB48320F54842AF915A3210C775A954CB60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 397b28248a82606da59d62f63e36a71cc2806f6e0d3c415aac7c464b563b3931
                  • Instruction ID: 97a55723fff6bba977bc6119f2b28f85137dd45a09f60e89538991f192729d77
                  • Opcode Fuzzy Hash: 397b28248a82606da59d62f63e36a71cc2806f6e0d3c415aac7c464b563b3931
                  • Instruction Fuzzy Hash: DB31A272E10219AF8F01DFA8D9809EEBBF6FF4C310B50812AF914A3210D7719965DF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e5997afea2d7ce94b07cf9fad5c32a50dcb5245c03566a39b0ea92405cd2b1dd
                  • Instruction ID: 106fe7ce36f164abb81ef3bdf721308dc2aa81b8fb19d4ef2b8f1576a3331b5e
                  • Opcode Fuzzy Hash: e5997afea2d7ce94b07cf9fad5c32a50dcb5245c03566a39b0ea92405cd2b1dd
                  • Instruction Fuzzy Hash: A52171747242048FDB189BBC989DB3E76D6EB88359F14953AF506C7385DE788C02CB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 94cc859081e77d0565fe9210352480a54c84ea3bafe93184a2b5956c19874803
                  • Instruction ID: c238f71be80fd404dc4c36f5a18bd72e003cefe3e64baec29abab8cda74cb239
                  • Opcode Fuzzy Hash: 94cc859081e77d0565fe9210352480a54c84ea3bafe93184a2b5956c19874803
                  • Instruction Fuzzy Hash: 4D31CF757501048FCB08DF69C998AADBBF6FF89714F6944A9E506EB371CA72AC00CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3d32b3787e0ff2164d0e40deafa667c3ff826197022a64444dc105f754b32d62
                  • Instruction ID: ffd80dcae36a2d0accfd725b07a81b6678aad43c7051d5112bdea883f2c85bfa
                  • Opcode Fuzzy Hash: 3d32b3787e0ff2164d0e40deafa667c3ff826197022a64444dc105f754b32d62
                  • Instruction Fuzzy Hash: 422180B4B106158FCB15EB788C9857FBBB7EFC8350758892AE815D7340EE309D018651
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0ccaded59d7232d12d2d09c6319e4aa52932a01321ec8ec73b3b2a46d724b289
                  • Instruction ID: a02fb21db92efae754c247336e0198b7ebbe340111b19ed06f2cc6a050d986f4
                  • Opcode Fuzzy Hash: 0ccaded59d7232d12d2d09c6319e4aa52932a01321ec8ec73b3b2a46d724b289
                  • Instruction Fuzzy Hash: CD21F2707083908FD7099B78D45466ABFF6AFC5210B1984AAD446CB3A2DE34DC06CB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 725f21de29588df5fcd74ee025d4ac627a502a920427549ae0513da3964d6a6c
                  • Instruction ID: ee16b90b8cc2042a699431b365ee9cfa3a824282768fe407a7251d03fecdeb9d
                  • Opcode Fuzzy Hash: 725f21de29588df5fcd74ee025d4ac627a502a920427549ae0513da3964d6a6c
                  • Instruction Fuzzy Hash: 2D21F3B1B10B059FD735CF38C496B26B7F5FB45208F140E69E2AACB741DB60E9188B91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 593f0b17aa38f2ea6e34a9f72d1e17773556399af8b98ad7eceb847facb0be93
                  • Instruction ID: 3130ecc22640bc04a7c8457cd2c776a79ffd92455ef35e161f4c35d986c62026
                  • Opcode Fuzzy Hash: 593f0b17aa38f2ea6e34a9f72d1e17773556399af8b98ad7eceb847facb0be93
                  • Instruction Fuzzy Hash: A2217A74B00605CFCB00EBA8C448AAEBBF6EFC9214F15419AE559DB371DB70AD85CB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f5f3335c387c32b2c8c6ca8ea7987b199419f0d84e3e8acea23097d2f056f447
                  • Instruction ID: 8b229a8df68572dc996df247ea283e3976ddcf2d6036f5032221c2b1144e4af5
                  • Opcode Fuzzy Hash: f5f3335c387c32b2c8c6ca8ea7987b199419f0d84e3e8acea23097d2f056f447
                  • Instruction Fuzzy Hash: 8A3114B5900249AFCF10CF99C984ADEBBF5FB48310F548429F915A3360C775A954CF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 89512af883283c52ed07cd35ddb90087469229116182f387d80bbc87344c6a28
                  • Instruction ID: 05617ade4e4c459470d70809ea044dca3d68f766ffa9696a163ea77897f72e36
                  • Opcode Fuzzy Hash: 89512af883283c52ed07cd35ddb90087469229116182f387d80bbc87344c6a28
                  • Instruction Fuzzy Hash: 3821C5B4710B058FD735CF38C496A16B7F5FB45254F140E69E1AACB740DB70E8188B91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1d21b5547c620117bc8dc6944bae47c42c9d308b351c4a3381e15251eeeb421c
                  • Instruction ID: 7b44c221e17535f699687e82c91d7402b2cb04d67c7e66478f9db11f9cf2bb78
                  • Opcode Fuzzy Hash: 1d21b5547c620117bc8dc6944bae47c42c9d308b351c4a3381e15251eeeb421c
                  • Instruction Fuzzy Hash: 86310132E04B058BD710EF7DD844669B761EF99304F058A69D8487F256EF70E880CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 40a6addb7cf2f6400898ec200ecd8316e229735a0ba6462a84c50956dcc38021
                  • Instruction ID: f04d954a9a158c4826cae251d98edab2b1d7ff9e7df404b4ac74b5766e846e7e
                  • Opcode Fuzzy Hash: 40a6addb7cf2f6400898ec200ecd8316e229735a0ba6462a84c50956dcc38021
                  • Instruction Fuzzy Hash: DB21C470E24205CFC710EFB9E9C05BAB7B4EB5A310F84486AF296D7291D3B0A841CB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e0cda8215a6e2b1b5c5805e644ca522f38c740e89b43a38803b6701444fdeb95
                  • Instruction ID: 9706e7532a152ea7a4b0640af49158b783e6dd1f45479c6e50239d59ebadf869
                  • Opcode Fuzzy Hash: e0cda8215a6e2b1b5c5805e644ca522f38c740e89b43a38803b6701444fdeb95
                  • Instruction Fuzzy Hash: DE213BB6710210CFCB149F28C458AA977F5FF89715F1945AAE506DB361CBB5DC01CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037083560.000000000194D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0194D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_194d000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6783504f2f75b70d74e1c908134bf91796bd985d5f73c44265ef6d6e3f3318a9
                  • Instruction ID: 09ef1470c566c738d5284b1175205a351b5b7b2a0a2fe39c8e5df51fba3c20c1
                  • Opcode Fuzzy Hash: 6783504f2f75b70d74e1c908134bf91796bd985d5f73c44265ef6d6e3f3318a9
                  • Instruction Fuzzy Hash: 8A2136B5104200DFCB05DF48D9C0F26BFA5FBA4318F20C56DE90D4B24AC736D416CAA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 08be9dfe80564c775487849a4effef3cc09f006824487856a47339bbb9cc61c7
                  • Instruction ID: db3f2edb33b4c1c116d629cbc0e8dec87310f50d0d34857584cc34fb2efe74e4
                  • Opcode Fuzzy Hash: 08be9dfe80564c775487849a4effef3cc09f006824487856a47339bbb9cc61c7
                  • Instruction Fuzzy Hash: 98210375A10209AFCF049FA0D885EDEBBB6FF89300F848615F401BB250DF34A844CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6b611b8dfffa7e7517dec1478861adec0b1b1506e8419e5959c90ce07976945c
                  • Instruction ID: 3345224165e4e2bbac41ad7283bbf7e0c6049f17afc37f8a7b1934443cf874c3
                  • Opcode Fuzzy Hash: 6b611b8dfffa7e7517dec1478861adec0b1b1506e8419e5959c90ce07976945c
                  • Instruction Fuzzy Hash: F621EF32E00B058BDB00AF7DD84466AB772FF99304F159A69D8493B256EF70E880CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037141285.000000000195D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0195D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_195d000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 79469a8e1c54dae48aa61fa820791fc36f432e6de849b3b5cc854436b1381559
                  • Instruction ID: fe7504dbfedd71276de0806ce69691f1382fcc6f017ec33573f31bd83e890b4f
                  • Opcode Fuzzy Hash: 79469a8e1c54dae48aa61fa820791fc36f432e6de849b3b5cc854436b1381559
                  • Instruction Fuzzy Hash: BB21D0B1504200AFDB45DF98D9C0F26BBA9FB84364F24C96DED0D5B252C736D446CB61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037141285.000000000195D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0195D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_195d000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 012c841f6d0a663c86a8ceed9ab31e0932bf30c4b4a0352695c98d86f35e3d91
                  • Instruction ID: fb34e856c22379d6355ccce6903b13636afd4a0c2a2f46fb65eb8d0adb5061d7
                  • Opcode Fuzzy Hash: 012c841f6d0a663c86a8ceed9ab31e0932bf30c4b4a0352695c98d86f35e3d91
                  • Instruction Fuzzy Hash: 082122B1504200EFDB49DF98D9C0B26BBA9FB84314F20C96DEC0E5B252C336D406CBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ee609d1b7100e2eea962c6682caf5e05c67319fa8da4306618a0f955b080c1fd
                  • Instruction ID: 3a5f22bfa1181d705d074920791fb6a23d194942769af004a75ab456f0853fb4
                  • Opcode Fuzzy Hash: ee609d1b7100e2eea962c6682caf5e05c67319fa8da4306618a0f955b080c1fd
                  • Instruction Fuzzy Hash: 99216FB57006159FCB24DE19D884FAA73BAEF88724F11842EEA06C7751CB71FC418B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad72c0db5ed2140049bbf55442e46b1ba9778bdc4689b34f9193c4f95b06b0f5
                  • Instruction ID: ba88acbe18510cb5ecc066be4dd148010347834136e80f770e9dc00738a844fc
                  • Opcode Fuzzy Hash: ad72c0db5ed2140049bbf55442e46b1ba9778bdc4689b34f9193c4f95b06b0f5
                  • Instruction Fuzzy Hash: 7E2190B57006059FCB24CE19C884FAA77BAFF89624F16402DEA06C7750CB31FC418B60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e6e66f6cde1023c808ecd2b44b9ba35f64769b279ad52613579edd854934757f
                  • Instruction ID: e0283fa0db0726c7a32ca970997378de8d8351f63de25245d65a223c5045ee21
                  • Opcode Fuzzy Hash: e6e66f6cde1023c808ecd2b44b9ba35f64769b279ad52613579edd854934757f
                  • Instruction Fuzzy Hash: C6210C78D19209DFCB40CFA9C1819EEBBF5AB49340F509095E448A7752D7709E40CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b2e8211613100c613940417b44e866303da9981373b1385441e6beeacb573c2c
                  • Instruction ID: 4ce3596d0f6e3fe628da18cca0f2087ad000ee1cf2771342b60d6a19a32f6269
                  • Opcode Fuzzy Hash: b2e8211613100c613940417b44e866303da9981373b1385441e6beeacb573c2c
                  • Instruction Fuzzy Hash: 5D21AE75700205CFCB14DF65C448EAABBBAEF89715F0581A9EA06CB361DB31EC05CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b0f1d1fb7167d7d7ade1bb4e286d0034c226127387cd5ee6ab3e764a188ac9dd
                  • Instruction ID: efc1eee448f62c02fd6e609bdecaf834a30df1cfdfcb7a36b81a9ea8929bf676
                  • Opcode Fuzzy Hash: b0f1d1fb7167d7d7ade1bb4e286d0034c226127387cd5ee6ab3e764a188ac9dd
                  • Instruction Fuzzy Hash: AF112771508249CFCB15DFA8C88479EBFF1EF95310F14889AE559DB692C334A815CB62
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3abd64fc9f6a2feffb9b0d3d4b0a96a82aa89595aa6eec02d5e96de93980e55b
                  • Instruction ID: a53cc370a229ebd17bec2cc41b7bc607495c1b9982da4cf672485c44cf25c10a
                  • Opcode Fuzzy Hash: 3abd64fc9f6a2feffb9b0d3d4b0a96a82aa89595aa6eec02d5e96de93980e55b
                  • Instruction Fuzzy Hash: F31104B1344205CFC719D769D450A2DB7F9EFCA628B9484ABD50ACB3A1CF70DC0287A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8124e6a6f258fd4e83e8119e78664d101d56ff6b6f581a6e8a987303de364fed
                  • Instruction ID: d3fce079d4c03ce5f6c7d214509073045c49be926211b8891aaa692c075a180a
                  • Opcode Fuzzy Hash: 8124e6a6f258fd4e83e8119e78664d101d56ff6b6f581a6e8a987303de364fed
                  • Instruction Fuzzy Hash: 3F215CB4A16208EFEF14DFA4E1858ADBFB5FB88345B219529E415AB352EB305852CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c7452a94e7b867c5516e56c526546b640ff6228f72f59fd50d17d5bfdc42a8d0
                  • Instruction ID: c7b55c8ad92cbbf15d23097891fc072a3a21bedc4dd826925f786c6fa83a7ce9
                  • Opcode Fuzzy Hash: c7452a94e7b867c5516e56c526546b640ff6228f72f59fd50d17d5bfdc42a8d0
                  • Instruction Fuzzy Hash: 98218C75710205CFCB14DF65C448EAABBBAEF89715F0580AAEA06CB361DB31EC05CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ae7441209a36427f8a12be50d01c32052781cf1dc0fbe60791c102e9c8ca5d57
                  • Instruction ID: 77235230b4e33fe54498c370849da7872e3c90a1840d652d6c1e892cc269bed2
                  • Opcode Fuzzy Hash: ae7441209a36427f8a12be50d01c32052781cf1dc0fbe60791c102e9c8ca5d57
                  • Instruction Fuzzy Hash: B911CC31B69344EFE338AB249D85B3A7756BBC2B40FE18427F6419F292D6B08800C742
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 60a37def7e694b58690ab9cf8319b3ad268d9f86361aad0562c0e960a4d54788
                  • Instruction ID: 403076c9046dffd2a501f3678a1ca49029995ad04ee34c3a0c8696f633f894b5
                  • Opcode Fuzzy Hash: 60a37def7e694b58690ab9cf8319b3ad268d9f86361aad0562c0e960a4d54788
                  • Instruction Fuzzy Hash: 6D1182B5A006165B8B14EA798D816BFB7F7EFC4261B588929E818E7340EF309E018661
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7cb7d339a7cefb4081f9a9a13e3a67ec6150b882884471e1b72c43e08c457e13
                  • Instruction ID: 828a92b84e7c04a94612edbd778932bc4d6fa34b1b8ea355c491ca32db01ed3f
                  • Opcode Fuzzy Hash: 7cb7d339a7cefb4081f9a9a13e3a67ec6150b882884471e1b72c43e08c457e13
                  • Instruction Fuzzy Hash: 781167B0E2A209DFCB04DFE8C4809ADBFF4BB49310F418595D498A7202D370AE418B80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1833fd9e5097a5b39fa598999b24ef1b198ffd31e9358b65b14ae83ec885a9a9
                  • Instruction ID: ab6359ba7a8ec49500d72e4503d18f47a7790323b14893ac3bf62aac738bf208
                  • Opcode Fuzzy Hash: 1833fd9e5097a5b39fa598999b24ef1b198ffd31e9358b65b14ae83ec885a9a9
                  • Instruction Fuzzy Hash: ED110871320A109BD314EB38D49576BB7DAF7CA704F208839D2CACB7C9CBB4A8804790
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 777cfa471f783473006ccc30085aa961efb3bb34589a8e0dd1dd531aae5c03f4
                  • Instruction ID: 0b742c06d0b16a87215d99a7cb7d51794b76300dbec7931ba53f3b7280aa86cf
                  • Opcode Fuzzy Hash: 777cfa471f783473006ccc30085aa961efb3bb34589a8e0dd1dd531aae5c03f4
                  • Instruction Fuzzy Hash: 2C119D71300205DBC718EB6DD894A9EBBA6EFD1210F00C96DD45A8B750DA31ED49C791
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2ee2826d87e608467447e1b6d65fa8192c2b3a6ffdd0e9baba57f791a194ab39
                  • Instruction ID: 6af2d062c46883e74d0f8966b3df52289a6ff6f84d4bc1b12680fc616a235a16
                  • Opcode Fuzzy Hash: 2ee2826d87e608467447e1b6d65fa8192c2b3a6ffdd0e9baba57f791a194ab39
                  • Instruction Fuzzy Hash: 3D2138B1D012489BEB18CFA6D8457DEFFB6AF89300F08C06AD408A6254DB740945CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8fcc0c7c09ed5071738c83453f8696606a55d54ebdf7cbc46c98cee3ac23ede8
                  • Instruction ID: db1d5722c5496e85099795b9515348c1ed87fab4c3ebb8ef07fa8a1679a6a8e4
                  • Opcode Fuzzy Hash: 8fcc0c7c09ed5071738c83453f8696606a55d54ebdf7cbc46c98cee3ac23ede8
                  • Instruction Fuzzy Hash: 7D21F4B0D29258CFDB04CFEAC8847EEBBB6BF99340F50E06AD449BA214D77459858F50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e9a002cc89ecb78f31737c10f82bfa3cfb0e16aef654a66b9095fd6ac65ce918
                  • Instruction ID: 4b3ec84c0d33c75e73fc131efab7cf47c28da6476780d5d746a4318d07760b50
                  • Opcode Fuzzy Hash: e9a002cc89ecb78f31737c10f82bfa3cfb0e16aef654a66b9095fd6ac65ce918
                  • Instruction Fuzzy Hash: 1411E572721A109BD310EB38D45575BB7DAF7CA704F248829D2CBC7789DBB4B4414790
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 66634c6684be71c8707e22f6f379fdb3a6d5fea2314157ffb7f3f167379c590b
                  • Instruction ID: 06d00b361811a834bd74c1d668a45dda39170515d6985b64f8e5453aee7a7403
                  • Opcode Fuzzy Hash: 66634c6684be71c8707e22f6f379fdb3a6d5fea2314157ffb7f3f167379c590b
                  • Instruction Fuzzy Hash: A1214A35910B5287CB209F69C450190B370FFA9320B15D779DDAD2B781EB71B994CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9488e8b775369e793448f3ea17f4121b88529f9ab9378cea257bd07a873ec04c
                  • Instruction ID: 61078575eb7ac71f37254468137a8d0621cb3a25be0e633aaff28fe57854b1af
                  • Opcode Fuzzy Hash: 9488e8b775369e793448f3ea17f4121b88529f9ab9378cea257bd07a873ec04c
                  • Instruction Fuzzy Hash: 3F214C31910B5687CB20AF6AC440190B3B0FF99320B15D779D96D3B381EB71B980CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037083560.000000000194D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0194D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_194d000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                  • Instruction ID: 179d82de0a623272b1757748e05abefd186ecbba7af35e8f1bbf05573c6b6783
                  • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                  • Instruction Fuzzy Hash: EA110376504240CFCB02CF44D5C0B16BFB2FB94314F24C6A9D8094B25BC33AD45ACBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ebb90a01cb2069f6d1841e95376ab21f698101ccb8edc9f95c6e27e89b2540bb
                  • Instruction ID: 546a0c6f1e41b4a99c609fd54b5efd0aa69b950d4fe82cb9031ba125c4c6d88c
                  • Opcode Fuzzy Hash: ebb90a01cb2069f6d1841e95376ab21f698101ccb8edc9f95c6e27e89b2540bb
                  • Instruction Fuzzy Hash: 8611E1703113118FE714AB78D4107AA66E6ABC5308F10D55ED18A8F7C3CEF659CA4BB2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 928eef30eafbde0535db7648a500ba417b364f2d6de685ac029e84d6b362f1c6
                  • Instruction ID: fe33aec35cce8c198bb047a6edfabbd7184c67a02df686f7eb2f79fd45a25ec0
                  • Opcode Fuzzy Hash: 928eef30eafbde0535db7648a500ba417b364f2d6de685ac029e84d6b362f1c6
                  • Instruction Fuzzy Hash: 95219DB0A15208EFEF14DFB4D5854ADBFB5FB88345B20852DD419AB352DB305852CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fbad22f5acc91f8b1e83965023407fefe4452c1be161ce42c8f7ca488804e9b4
                  • Instruction ID: d5c27a8cb84b1c2dadb9851dc489e7fd8f7c99e8143d1d991c5159c0a4c5ec98
                  • Opcode Fuzzy Hash: fbad22f5acc91f8b1e83965023407fefe4452c1be161ce42c8f7ca488804e9b4
                  • Instruction Fuzzy Hash: 2C21E2B59003499FCB10CF9AD984ADEBBF4FB48320F14841AE919A7310C375A944CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fc9cb9de20a1c48735b8571dd1a67e969db5c3e5f4cf05c2ee3510bf096c4c26
                  • Instruction ID: 6da85dac62ac281442d95dc80839fa7dedf9d05f7e53bf367c9a1a6e97c91422
                  • Opcode Fuzzy Hash: fc9cb9de20a1c48735b8571dd1a67e969db5c3e5f4cf05c2ee3510bf096c4c26
                  • Instruction Fuzzy Hash: 0A11BC30D152599FCB05CFA8D8889EEFBB5FF99310F49C126E540A7281D730A895CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037141285.000000000195D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0195D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_195d000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction ID: 7214a7fcd12867c5fdc73e5746e79bccc0ab6c1e66fdda22c93105d0fe73f60c
                  • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction Fuzzy Hash: EA118B75504280DFDB16CF54D9C4B15BBA2FB84214F24C6AADC4D4B656C33AD44ACBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2037141285.000000000195D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0195D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_195d000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction ID: 9f3fa455041afdde70c7d5fe1e1019db7bbe8fb0db6fe739ca881bc570fb32b5
                  • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                  • Instruction Fuzzy Hash: 2A11BB75504280DFDB12CF54C5C0B15BBA2FB84224F24C6AEDC494B696C33AD44ACB61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c02dfd455944aa7c28ae4372949227e76b7c8a939b27337adb8eb54d98ad6a25
                  • Instruction ID: 70b9caa2e613522c1db400480e817b1d7175a29253692d9abe97b13ebac87364
                  • Opcode Fuzzy Hash: c02dfd455944aa7c28ae4372949227e76b7c8a939b27337adb8eb54d98ad6a25
                  • Instruction Fuzzy Hash: A401D6B2720D0547CB24992CACD07BFA2879BC9719F2D896A9706CB398EE64A9494350
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ca5f9981419b0e919b9d0b59e82f2c527a34d77f7766cbcf65a8a23d4d9e6559
                  • Instruction ID: d45e2b5b3d76f4c52dbe98c144b17ba73dd588434c982898fbe0e381f1218aa4
                  • Opcode Fuzzy Hash: ca5f9981419b0e919b9d0b59e82f2c527a34d77f7766cbcf65a8a23d4d9e6559
                  • Instruction Fuzzy Hash: 8811EFB59003499FCB10CF9AD984ADEBBF8FB48320F14841AE919A7310C379A944CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d883ca46b07c922172ee966c197a03ae5623051c7c3e29b7024e967a00ea5c06
                  • Instruction ID: 4ae122537b278dfd5cd69156bbd00f06a7d326fee3f5925d8c63851368aa371a
                  • Opcode Fuzzy Hash: d883ca46b07c922172ee966c197a03ae5623051c7c3e29b7024e967a00ea5c06
                  • Instruction Fuzzy Hash: F111BF76500704CFCB01DF64C844A9AFBF9FF89714F05C19AD2198B272E776940ACBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4561ba1509d27acdc067f6a3824e8dd8f1f2ed03e8de6d93845dffe8f17662ae
                  • Instruction ID: 2a2929e5e2157717fa69c9c36426b4fa032fbad3b12c06c06a0b6c03d5ac54c1
                  • Opcode Fuzzy Hash: 4561ba1509d27acdc067f6a3824e8dd8f1f2ed03e8de6d93845dffe8f17662ae
                  • Instruction Fuzzy Hash: 0A1149B58002099FDB20CF9AC945BDEBFF8EF48320F24841AE414A7750D379A944CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6540228efb263e2db2423bb689980b4bf499ddbc197dc3bba07481611a46fc4a
                  • Instruction ID: 19c62976ae2a53020d4cdcbf5f1e7abd7122ba3dadd2ccb39ca4503a29991c13
                  • Opcode Fuzzy Hash: 6540228efb263e2db2423bb689980b4bf499ddbc197dc3bba07481611a46fc4a
                  • Instruction Fuzzy Hash: 9911C4703113218BD714AB78D4157AAA6DAEB84318F50D91DD18A8F3C3CEF6988547F2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e89f1abb7c312295acf29eb25743e90e713f8916083cb38966c59f5595b4337e
                  • Instruction ID: 8a824dacbc4ac29d1d80d7b03630f120ae5558217660b16ebfc859a9317e2d54
                  • Opcode Fuzzy Hash: e89f1abb7c312295acf29eb25743e90e713f8916083cb38966c59f5595b4337e
                  • Instruction Fuzzy Hash: E801F9B2720D0547CB249938DC8076FA387ABCD725F2D8569D706CB358EE64A5494350
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad043eca4891260273a2268b70d3e9aadbf9031e6f370ff1392f057be4587708
                  • Instruction ID: 2d309cf23f9af83bf4a65469f8a722ba3d9c4acd9bc0e8e21c93f380cd1aff72
                  • Opcode Fuzzy Hash: ad043eca4891260273a2268b70d3e9aadbf9031e6f370ff1392f057be4587708
                  • Instruction Fuzzy Hash: C11128B58102099FDB10CF9AC985BDEBBF8EF48320F24841AE515A7750D379A944CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ada6182651b86e59db4703d7990b2ea975a6cd576d7252af8473d81b80b2b310
                  • Instruction ID: 8961d0f1def4ed9ee2a2a0274d6faa3982e0592be176a10d570c33d8da61698e
                  • Opcode Fuzzy Hash: ada6182651b86e59db4703d7990b2ea975a6cd576d7252af8473d81b80b2b310
                  • Instruction Fuzzy Hash: 0F112AB5A00216CFDB24DFA8C589A9EBBF4EF08604F244469D505E7361D7B1DD41CF91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25263b8c9752e69cdeaff9f6b3882481029ef5d4aab1da988b0cc968daabeed4
                  • Instruction ID: 8fb1e9396064f333ca31309520f3354d17f5964cd583bc79e691956c13a52f1c
                  • Opcode Fuzzy Hash: 25263b8c9752e69cdeaff9f6b3882481029ef5d4aab1da988b0cc968daabeed4
                  • Instruction Fuzzy Hash: E501D4B2638221CFDF10C669E9E4E767BA4EB4536DF401463F146CB182C274AC408345
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7b8a74c2a2f2165e98ce2e5e544045785515753ba559517d0df19d02191002cd
                  • Instruction ID: 82690f978aee664f91b18e6f8469572e757b3477ae184f522d0ca87922d25f7f
                  • Opcode Fuzzy Hash: 7b8a74c2a2f2165e98ce2e5e544045785515753ba559517d0df19d02191002cd
                  • Instruction Fuzzy Hash: 4F11E574E2A209EFCB04DFE9C5809ADBBF9BB89350F51D595D458A7201D3B19E41CF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21a252a174308a7a5cb6a378859c124095c7c34b50a3394fba926145876f7501
                  • Instruction ID: b5d8a7d58ced0eb631f9ed720d47f90f150392fbaffcd554dd3894417c7f330e
                  • Opcode Fuzzy Hash: 21a252a174308a7a5cb6a378859c124095c7c34b50a3394fba926145876f7501
                  • Instruction Fuzzy Hash: 5611E3B1D016189BEB18CFABC9457DEFAF6AFC8340F04C06AD80876254DBB50945CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c102988c9966eb16e7c205d9893d19b1e29a9437156a56a9c30b28eb02e4e37d
                  • Instruction ID: 43c266855c41b644d33d15994de56a411470230c9cd6c95d8a246746b63ac628
                  • Opcode Fuzzy Hash: c102988c9966eb16e7c205d9893d19b1e29a9437156a56a9c30b28eb02e4e37d
                  • Instruction Fuzzy Hash: C301F77092E248EFCB06CF65C5809FCBFB8AF46340F84E6A5E4495B192C3B08A44DF61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1671718ccffd2faef605f44c2514bbed11d1c0a1699301cc93cca001bb9cc3c
                  • Instruction ID: f7b30df086e96dd96eac37a389f9ae45b92c80990005b85d959ea1751f1440fa
                  • Opcode Fuzzy Hash: b1671718ccffd2faef605f44c2514bbed11d1c0a1699301cc93cca001bb9cc3c
                  • Instruction Fuzzy Hash: 1C110634A25219CFDB14CF94C5C09EDB7B9FB4D351FA49196D44AA7241C730AE81CF61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4da807f50d97073959accaf20e12859ad149ea9072e6dca6cfab767966d725c8
                  • Instruction ID: aa014ef4ff14b32600b5dfd994d3b01dc5b5118ae047c825f6c6e607fb3d6450
                  • Opcode Fuzzy Hash: 4da807f50d97073959accaf20e12859ad149ea9072e6dca6cfab767966d725c8
                  • Instruction Fuzzy Hash: 22114974916205DFEB00DFE8E6859ADBBB4FB88344F00E629E416AB394D734AC51CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9a10440e43e9af2de8193cc96515c790c5400307a8003ea3c1ec615c3ed595e2
                  • Instruction ID: 4354d90d6b330fe0a71561c83a36048d4de724ed7c376d347b7490aeaee86e5f
                  • Opcode Fuzzy Hash: 9a10440e43e9af2de8193cc96515c790c5400307a8003ea3c1ec615c3ed595e2
                  • Instruction Fuzzy Hash: 33019274A1A148EFC700CFA8C584EACBFF5AF89300F55C0D5E4088B361C631AE44DB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 185447188cf85250063bab6f7ff88f207f8db0f313198226249f67de12ee68cc
                  • Instruction ID: 6dd7853df183652ea61b7c8f43c06bcd77091eb7dbc9a0395877886b287f33e8
                  • Opcode Fuzzy Hash: 185447188cf85250063bab6f7ff88f207f8db0f313198226249f67de12ee68cc
                  • Instruction Fuzzy Hash: 57118E75500714DFCB00DF65D848A9AFBF9FF88714F04C06AD2198B271EB72A44ACBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e6e3ce3eb99dba23befa52e384a856df71f0e53fb8600b131aa6c43dc182baa3
                  • Instruction ID: a2dd2caf9ce126a56b38f4366a4e1e65808eff5eec53a6cdf402f27ce203291d
                  • Opcode Fuzzy Hash: e6e3ce3eb99dba23befa52e384a856df71f0e53fb8600b131aa6c43dc182baa3
                  • Instruction Fuzzy Hash: 8501ADF190020DCFEF28AFB584543AD7AA5DB8A319F14982AD505A6280CB784944CBB9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6cbe7e2243af274b54734c46e1936cc5784b42f54df3d7aee53e2001c4c5898
                  • Instruction ID: 501ea9d30ad668e463a86332590d460abbae77f94bbdf60b026cc2ef0361e1ab
                  • Opcode Fuzzy Hash: c6cbe7e2243af274b54734c46e1936cc5784b42f54df3d7aee53e2001c4c5898
                  • Instruction Fuzzy Hash: 880128B03047118FC7016AF8AC0937927F29B8324BF8104A7D295CB380CB34CD8687A2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 05f47db808fa39f29171930539d1c6737791097a61cb33f69e5947747426afb4
                  • Instruction ID: 24f47e20c72e27cd34fc8e548f5598f5241694a4cf9ce33f6288e3dfed92c183
                  • Opcode Fuzzy Hash: 05f47db808fa39f29171930539d1c6737791097a61cb33f69e5947747426afb4
                  • Instruction Fuzzy Hash: BF115A74926228DFEB28CF64C985BE8BBB5FB09341F8050DAD449A7341C7749981CF20
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b6c39742f0fe0fd078bab88c70b3f5052bfcd3dd1adfa3da3cc3c189a9590658
                  • Instruction ID: 1e02fdd87384094355b8d33546f55450b7c851e2bd05c3e3762ef1228190b038
                  • Opcode Fuzzy Hash: b6c39742f0fe0fd078bab88c70b3f5052bfcd3dd1adfa3da3cc3c189a9590658
                  • Instruction Fuzzy Hash: B611C6B4A16209DFDB14DF28E584BAC7BB5EB8A341F01E694E44997211D7709D41CF11
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3f06ececcc6624401d4d7b5c8fcd7c220283ba482b032b5f80e9f7df661f5423
                  • Instruction ID: 8a7c90135d83abd5ea572e0a98bb66a0d1ad59ebe886bf8ed408c5d1b865b81d
                  • Opcode Fuzzy Hash: 3f06ececcc6624401d4d7b5c8fcd7c220283ba482b032b5f80e9f7df661f5423
                  • Instruction Fuzzy Hash: A6117CB5825206DFDF04EFA8E2898A9BBF4FB89340F41E418E415AB351E7309850CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1eedff3a7160341f48be3a4da28fb8a79005f9b8aa5462f09af2619eaebd6b11
                  • Instruction ID: 28e0d9fbfada00ec152a28f631d85f79112fac3cca706e431e662a81d582e981
                  • Opcode Fuzzy Hash: 1eedff3a7160341f48be3a4da28fb8a79005f9b8aa5462f09af2619eaebd6b11
                  • Instruction Fuzzy Hash: CEF0F971304209CFC718D669D450A2EB3EADFC5618BA0C42DD5098B250CF70EC0387D1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8bb0e04ab770ebe571d8fe273d15699bd5bfbca7636235e12d9c6c7447ddc727
                  • Instruction ID: 39fa02134ff31739bb715693acf76916654bf54b697ab71cf96f10d2fb7356c7
                  • Opcode Fuzzy Hash: 8bb0e04ab770ebe571d8fe273d15699bd5bfbca7636235e12d9c6c7447ddc727
                  • Instruction Fuzzy Hash: 74F022B27043510BCB1A9A7C9C901AAAFFAEFC5214344896BE54ACB391CF20CC02C3A0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2d41683940b51baf3db1c8a831c8a67caa7333517c42e7b84ef66411bb264319
                  • Instruction ID: 0228ae807667b68ce251a7109c89a212437910fdc4b141b6bcdbd7e30e99af2e
                  • Opcode Fuzzy Hash: 2d41683940b51baf3db1c8a831c8a67caa7333517c42e7b84ef66411bb264319
                  • Instruction Fuzzy Hash: 24F0D170390202CBC628962DC080A7B77EEDFC9710F50496EEA1AC7781DE709C008390
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cb5de858370c7f8e9b7f6f8790ee61c38db68ae9aaf197e7f6b7bea32fb9ef79
                  • Instruction ID: 1602f9fb53e334f134f52304c9fad351382ffc258b1887cc2570ed31483efed2
                  • Opcode Fuzzy Hash: cb5de858370c7f8e9b7f6f8790ee61c38db68ae9aaf197e7f6b7bea32fb9ef79
                  • Instruction Fuzzy Hash: 71F028B53402018FCB18C66CC454BBE7BEE9FC9600F1648AFD91ACB796DA309C0597A0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 561fd5e4f7fa71e7f5b62bb7a6b04d581f208df0bc3aca54acb09a5bf62b87d3
                  • Instruction ID: cd11b3b626829c4f31fd31ff13cc85c1ec1a6b3d12c167c3f8fae89165359a4a
                  • Opcode Fuzzy Hash: 561fd5e4f7fa71e7f5b62bb7a6b04d581f208df0bc3aca54acb09a5bf62b87d3
                  • Instruction Fuzzy Hash: 46F0656A26D3C51FD70353302A906E87F759D6362534D05CBD1888E467D920156ED367
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 16bc403d90277dfe1fdb7de62e16e7a5d6649b76d1c348d662c8704bfd09c4fe
                  • Instruction ID: 832c74559ce0ecda531e2f7f513a245d5ab624147335c654ea2209e500954661
                  • Opcode Fuzzy Hash: 16bc403d90277dfe1fdb7de62e16e7a5d6649b76d1c348d662c8704bfd09c4fe
                  • Instruction Fuzzy Hash: 4BF05E75614208AFDF09DFA8D8858AE7FEAEF48310B14807BE805DB360EA31A9518754
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3205a7f4887137f2c340a6b6d7628cfb80c3a4a85e6730aa9978ae355c134860
                  • Instruction ID: 2bfa3ebedb97497d68447332b7f28a620ae7e6e759e428978a76aaadbfcf1592
                  • Opcode Fuzzy Hash: 3205a7f4887137f2c340a6b6d7628cfb80c3a4a85e6730aa9978ae355c134860
                  • Instruction Fuzzy Hash: FE11A174915205DFDB00DF98E6849ADBBB4FB88341F50E128E416AB394D734AC51CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4b5c57256e553321f0e73f1f56094d0f3f917a4bd38b468ea9d9e7e4f9f519b8
                  • Instruction ID: dc86a13c50e9a501128d8a3fbbbd1a19453a850de66b45503f2c7be0d790d654
                  • Opcode Fuzzy Hash: 4b5c57256e553321f0e73f1f56094d0f3f917a4bd38b468ea9d9e7e4f9f519b8
                  • Instruction Fuzzy Hash: 6F01AD76A006048BCB14DF6AE0044EEF7FAEFC4311B04C06AD55997220EB30AA06CB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 78150e4000d908673e8b3b12f8f53eed3fb9e3d80461674acb8a0365ba9650ee
                  • Instruction ID: 91e571ae8a42849f5330b7533bfe36a486fdc5d4fd693e78b213c1cec66cdb84
                  • Opcode Fuzzy Hash: 78150e4000d908673e8b3b12f8f53eed3fb9e3d80461674acb8a0365ba9650ee
                  • Instruction Fuzzy Hash: 1FF0AF7092D208DBCB05CF66C5809FCBBB9AB89380F90E5A4E4095B291D7708A80DF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 77fb928b3cd977ab04f48d7b1416752eda15dc08af0ef9b214571b1e4d4cbe37
                  • Instruction ID: 9038b4661387bdd3c986b5df5d81ec172226d4936ecf57fbf94a2ca24d5ac333
                  • Opcode Fuzzy Hash: 77fb928b3cd977ab04f48d7b1416752eda15dc08af0ef9b214571b1e4d4cbe37
                  • Instruction Fuzzy Hash: 24F0B4B17002154B8B1896AD9C9046F7BFADFC4224354882AE50A9B355DE25DC0083E0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2bc38a87354f6aa87514ca732b5f8fe91602b9a7cfa6001bbf29880c6c5e8ac8
                  • Instruction ID: 14ee5095bbc9d110c16a3520ae7c513c6f1e9d29cc3a4494730c107c78edd083
                  • Opcode Fuzzy Hash: 2bc38a87354f6aa87514ca732b5f8fe91602b9a7cfa6001bbf29880c6c5e8ac8
                  • Instruction Fuzzy Hash: DF118EF0A0221AEFEB188B20D8457A87B72EBCA342F01C1E59489AB700DA749D81CF11
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b33776a20631f46c43cdd4d845ecff135f3b40759ba69ded8d4df9264b605f58
                  • Instruction ID: ec909736fca959d15de5d48724f794dbfefea281e5a5e5ea74dcd1810c3edae6
                  • Opcode Fuzzy Hash: b33776a20631f46c43cdd4d845ecff135f3b40759ba69ded8d4df9264b605f58
                  • Instruction Fuzzy Hash: BBF0B47A3052068FDB06EF78D5409ED3B7AEF8535031548A6E144CF2A5DA709C06CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b56b3c8917b3353183039054b8e8fdea6280487780e17b8b5b6d698ee1e171f9
                  • Instruction ID: 6d86377334f78c1d35b06b59f174610471f37164d133a86e18c02c2dae4c63c1
                  • Opcode Fuzzy Hash: b56b3c8917b3353183039054b8e8fdea6280487780e17b8b5b6d698ee1e171f9
                  • Instruction Fuzzy Hash: 10F0E26643D3D05FC603573498A48D67F30AF57358B0A58CBD1894F0A3C524191DE76B
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 090bad4c1e4093c3092392d9e6e6376ddf539c5e173da7102069b61f1a643ee8
                  • Instruction ID: 92d2ca76f66c2836d6ec82ae78def9604ad40e5912c9e41b65f5b7f2de4fd683
                  • Opcode Fuzzy Hash: 090bad4c1e4093c3092392d9e6e6376ddf539c5e173da7102069b61f1a643ee8
                  • Instruction Fuzzy Hash: 36F0A072301615DB8724CB6AFC8486ABB9EFBD833A318C037F70887240CB31A851C7A0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d9e7bad5f7ec22f7f6f1b0407f72d56777ea24d324b0ba3c18d6a87d5000e230
                  • Instruction ID: 73773cb841a9df891b4e9fae305bd9efac81c35fc945c91ddf210ffdbfa3cbfe
                  • Opcode Fuzzy Hash: d9e7bad5f7ec22f7f6f1b0407f72d56777ea24d324b0ba3c18d6a87d5000e230
                  • Instruction Fuzzy Hash: 5EF02234D05248AFCB21DFA8C8005ECBFB0EB81310F00C2D6E49497391D2354A11DF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1d8a81356b4827e60f8da30099311a388719b5ee34394cd9baf104bd5049eac9
                  • Instruction ID: 46cf9faf1e3a9cb7584b1e127ef5cc018622792f4402125c87389675dbc49a78
                  • Opcode Fuzzy Hash: 1d8a81356b4827e60f8da30099311a388719b5ee34394cd9baf104bd5049eac9
                  • Instruction Fuzzy Hash: E6F0D4B16147058BDB28CF28D482A957BE9FB09258B20095AE51ACF202E762E8438B85
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ef2feff0da498ce853a6eee80db7d1b8c45d1adc840ab276b85e0efd543938f1
                  • Instruction ID: d59dfe588d30440d570b154352f7db4ea9a99f7df87041cf675bab4a14807948
                  • Opcode Fuzzy Hash: ef2feff0da498ce853a6eee80db7d1b8c45d1adc840ab276b85e0efd543938f1
                  • Instruction Fuzzy Hash: CFF0B471309391DFC317CB699C585697F6AFF8922670D80B7E144CB292CB34A845C761
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 62ba65b1d762f0eeb4b043fe666d7178dd87cf434932336017645158bf5c4f0f
                  • Instruction ID: 83b0178acd1477c863dece4d0d681cb0db4650b28c4c5e0cb188552eb645d798
                  • Opcode Fuzzy Hash: 62ba65b1d762f0eeb4b043fe666d7178dd87cf434932336017645158bf5c4f0f
                  • Instruction Fuzzy Hash: FBE068B330021EC3CB1192ECEC4065AB718D78206EF08847BD200C1528E921E84183C1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d93d22d4aa6adabe07fce777d114d42da06bf624276307448dd7f205e2daf322
                  • Instruction ID: b6c6c51c21de0185eed0daee83f8f6772650b22581634c8f9cc3a2cd608b1f8a
                  • Opcode Fuzzy Hash: d93d22d4aa6adabe07fce777d114d42da06bf624276307448dd7f205e2daf322
                  • Instruction Fuzzy Hash: B2F0EC71E1011DABC710EBACD8482ED77F4EB86315F408C25EA19E3240EB706948C790
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c5a414fdd59c8e75b5ea801ef778c971b5eee21be0956db08b29b32a185a47c1
                  • Instruction ID: d1814fad533b881a47ff391f9221f1689607c30f4aea949a6988dec5c07d3379
                  • Opcode Fuzzy Hash: c5a414fdd59c8e75b5ea801ef778c971b5eee21be0956db08b29b32a185a47c1
                  • Instruction Fuzzy Hash: 43F03072604108BF9F08DF99DC419AE7FEEEF48314B54806AF408D7360E671E950C754
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 63f211b0f56b805f0b1e33150d0a8fc49e6cba3c52658ad9130b3755e55fbc3d
                  • Instruction ID: acf89b90dd6aab7ea3bb13551f7774189880febd0aa1c651c26962b74c0a2feb
                  • Opcode Fuzzy Hash: 63f211b0f56b805f0b1e33150d0a8fc49e6cba3c52658ad9130b3755e55fbc3d
                  • Instruction Fuzzy Hash: AAF090B4D1430A9FEB04DFA9C882AAEBBF0BB08300F804669E514E7341E7748904CFD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: df1de848eac6ce4bdbe8743d5bf014e784f9d814d9ea5998901b736dac41d07a
                  • Instruction ID: d0fa3f158e7ade3e53766ee624fd83c65d9182723de642c7bc58562112da8283
                  • Opcode Fuzzy Hash: df1de848eac6ce4bdbe8743d5bf014e784f9d814d9ea5998901b736dac41d07a
                  • Instruction Fuzzy Hash: D2F0A0393012069BCB15EF29D440CAE3BAEEF893507504469E6048F264DE71EC05DB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6cafd14ca70345f1173e4f1318b14817e125e89de0ddde63e3494c46b10188b2
                  • Instruction ID: 4f67165e327d48d47c2b562fc0eea1b0e3ab2baa29dbe8eb0e219ceb7807972c
                  • Opcode Fuzzy Hash: 6cafd14ca70345f1173e4f1318b14817e125e89de0ddde63e3494c46b10188b2
                  • Instruction Fuzzy Hash: 24F0ECB2D1011CABC750DBACD8057ED77F4EF85319F448424EA19E3244E7306A09C791
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a49a416fa189a663f09ebd701c08fe0c5ac1fdd119eb5acdbba461e0303bdfae
                  • Instruction ID: e599dc862a469bc49be6a92da3f54bd38799e1e2c19bfa39cc315cccefff6c19
                  • Opcode Fuzzy Hash: a49a416fa189a663f09ebd701c08fe0c5ac1fdd119eb5acdbba461e0303bdfae
                  • Instruction Fuzzy Hash: 93F0DAB4E1420E9FEB44DFA9C941AAEBBF4AB48300F5045A9E918E7201E77495158BD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: daa89cb1b55d7369bd7d4f6849c882848602d1461f2468a41b9675aef3cba8a1
                  • Instruction ID: bddd40aae51d9c676c21ac59a21add82613247bdfdcc887f778dcf7cde8dde6f
                  • Opcode Fuzzy Hash: daa89cb1b55d7369bd7d4f6849c882848602d1461f2468a41b9675aef3cba8a1
                  • Instruction Fuzzy Hash: 9AF0987493A214DFCB44CB66C5808BDBBB9AB9E381B889055D50992296C7749942CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: db6a1a376988eb02da20965a3fe92bef3b176b58516f679cb69f4ce2045f1682
                  • Instruction ID: aa3be8a24b710fc58056599631ff572c650e19a8314d167eb99227b917b9fac0
                  • Opcode Fuzzy Hash: db6a1a376988eb02da20965a3fe92bef3b176b58516f679cb69f4ce2045f1682
                  • Instruction Fuzzy Hash: BCE0202135131453D204731C9450B6F6689CBC2754F008837E1895F3C1CED11C4943F2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1632e9a10487f0b3ff94388cfd52788a261340535508819f6a521fc3b8dde24d
                  • Instruction ID: 805a67270d0cde7657d7e63d8265730208e56cda4088f37d3d6dbc586373e2b0
                  • Opcode Fuzzy Hash: 1632e9a10487f0b3ff94388cfd52788a261340535508819f6a521fc3b8dde24d
                  • Instruction Fuzzy Hash: 56E08632B001145BCB249A3ED949B9ABBAECFC1525F0941B9ED0CD7364DE25EC1A82E5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 515a50c949d2d27374fef67aa677b3e77d8438d7fb1eefb586e9dc548d5eabdb
                  • Instruction ID: bee6d6724a9ccffcd9cbcce9e0fe013fc25518c7dffda921afcec77e2f3b269d
                  • Opcode Fuzzy Hash: 515a50c949d2d27374fef67aa677b3e77d8438d7fb1eefb586e9dc548d5eabdb
                  • Instruction Fuzzy Hash: 39E0D8F26143014BCB14CF5CD8933A67BE1EB04318F140919E116CF380E721D8038BC4
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d4191aa45aebde56da51c732d9ab35a4c84da838dc88e7d0445f5aef71e1bb6
                  • Instruction ID: b229eb5cfefdc97c5308c74155ecb57a573fbc5c0849087bd327ed38258da587
                  • Opcode Fuzzy Hash: 5d4191aa45aebde56da51c732d9ab35a4c84da838dc88e7d0445f5aef71e1bb6
                  • Instruction Fuzzy Hash: 34E0267679132053E305A26CD41179E4386DFC0B44F048836D28ADB7C2CFE5988A03F1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5a6ca8adb348882c34d6e13abf3c6d5a3ec4cdebad5acd41dadf7791486e6212
                  • Instruction ID: e30b270c49d9fd0cd7563e57e52fd4c6b1a51b608278464f5c0cab36ff52d887
                  • Opcode Fuzzy Hash: 5a6ca8adb348882c34d6e13abf3c6d5a3ec4cdebad5acd41dadf7791486e6212
                  • Instruction Fuzzy Hash: 4AF012B0A1060ECBEF28AFB5C4153AD7EA5DF89315F109439D105A6280DF744444CFB5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c0711bc805f3999523498d8e3739c798be9e4020a3c611e1e3c38d51bda844b4
                  • Instruction ID: 001893c764ef51173b8ac970ab72ffce3b10780cad27ea1fee444387d8b9e28f
                  • Opcode Fuzzy Hash: c0711bc805f3999523498d8e3739c798be9e4020a3c611e1e3c38d51bda844b4
                  • Instruction Fuzzy Hash: C6F0B23896621ACFDB60CF94C980AA8BBB4FB09341F5090A6985AA7711D7309D81DF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 487c9c63a320258e6407d2202208b5553aebb059c2ec09a9238411ca4a4e42ca
                  • Instruction ID: cfb3bc986b874c4222e1f1a57148c5a9049d168ff4fdc3ae114ece0f83131538
                  • Opcode Fuzzy Hash: 487c9c63a320258e6407d2202208b5553aebb059c2ec09a9238411ca4a4e42ca
                  • Instruction Fuzzy Hash: 9CE06D32244A818FD3158A38C848F967BE4AF0A619F0901EAE66ADB3B1C661A800CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 88faf74f1a1402b1933926026faaf53204b1dfb5be6a42f1bc367563bd0a118a
                  • Instruction ID: 7abbd9a8c6553ed6586dd9798e3f57d06be1a1dddb77c2b95f06f99f491613c4
                  • Opcode Fuzzy Hash: 88faf74f1a1402b1933926026faaf53204b1dfb5be6a42f1bc367563bd0a118a
                  • Instruction Fuzzy Hash: ABE04F767097504FD70A676894207DAAFE58FCA250F0A81ABE199DF3D2C6A049018761
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9cc10d7a5c14ac951cfcca3c0a5a4b1d22cdccd235ba335695a18823986f208
                  • Instruction ID: d87d635b561718ac4b6e27744e746f6875aaf37c03da94c7aaa7a7529a782df7
                  • Opcode Fuzzy Hash: c9cc10d7a5c14ac951cfcca3c0a5a4b1d22cdccd235ba335695a18823986f208
                  • Instruction Fuzzy Hash: 55E086DA62C389CFDB12067084951E16F25EBB73507D5508BE084CE992D9154A46D322
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3ccb1cfa2a9e74efe49f3e0759d1bbe406d437ef22b0b0df47528b9a5a0b1554
                  • Instruction ID: 642460b20960121bfdea9e7ea2aa2d815a031bbb2943cf8c5b11ed15106f10f3
                  • Opcode Fuzzy Hash: 3ccb1cfa2a9e74efe49f3e0759d1bbe406d437ef22b0b0df47528b9a5a0b1554
                  • Instruction Fuzzy Hash: 53F015B4D01208FFDB44EFA8D504ADDBBB5EB88301F10C0AAE80892350E6349A60DF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1210035d380285248d879cd6a42ef3fbc564a83cfbf052a30a067baa9e4b3633
                  • Instruction ID: 7cc76af240c07dd9338f7a4a702f69356ba7facb830f126e5b3af15d73618d0f
                  • Opcode Fuzzy Hash: 1210035d380285248d879cd6a42ef3fbc564a83cfbf052a30a067baa9e4b3633
                  • Instruction Fuzzy Hash: 98E0C237A002182BCF0566A88891B8A3BE9CB8A150B0940A7DA058B351DD16DC08A3E2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c66378fd9f963cd446f2dc59d9d4b738a31fec4ccaaefb62176dd36ea836f9c6
                  • Instruction ID: 0a3df4151e3fd0786fb815cf02e10cbac84ac1b3e161503b1536f6953e695e58
                  • Opcode Fuzzy Hash: c66378fd9f963cd446f2dc59d9d4b738a31fec4ccaaefb62176dd36ea836f9c6
                  • Instruction Fuzzy Hash: A4E06D71D1424DABCB01CBA4C5459DDBFB1EF02228F1087EAD935962D1EB311706DB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 59ddb128664e171616cd4fdcc33ec92584ec82694b03cbcb2c6e574f0b1d4460
                  • Instruction ID: 5bf2531b23314167661a77ef2ca86ec870b31a5211301470f5a817b696a668f4
                  • Opcode Fuzzy Hash: 59ddb128664e171616cd4fdcc33ec92584ec82694b03cbcb2c6e574f0b1d4460
                  • Instruction Fuzzy Hash: F9E07E75D1420CEFCB40DFA4D9858DDBBB9EB48204F1082AAA809A2204EB306B159F80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 97cde4871a1bf205a7b18a13b7ebb65fb3c6343973a43af311da26fbb7a935da
                  • Instruction ID: 5cb413e9775e64f271adb3ca0d765ea85cd051763f1d0c8edba2960859a2aba3
                  • Opcode Fuzzy Hash: 97cde4871a1bf205a7b18a13b7ebb65fb3c6343973a43af311da26fbb7a935da
                  • Instruction Fuzzy Hash: 14E0E635244A558FD324DB6CD448FD677D8EF0A715F0504EAE65AD7371C671AC40C750
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0d784b4b2c2e87870903eacbf7324e72af18ca551368b21b91574bdfc6eef560
                  • Instruction ID: 5c617eb681a94e187b5879bd08b3e41c66e62b129c20c82a30fcb98dfc54eeb6
                  • Opcode Fuzzy Hash: 0d784b4b2c2e87870903eacbf7324e72af18ca551368b21b91574bdfc6eef560
                  • Instruction Fuzzy Hash: CED05E357043244BC70967489010B9AB6DA8FC9650F05C07BE60E8F382CAA19C4043E5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c27e747d31a8a9c3e471cb83d60089fd848ec944755af3beddd8ef02cc67eb58
                  • Instruction ID: 2be8712699fd1e3e0342e0096f6aae5a51177ba44edd715fdd4e34f4629c19d6
                  • Opcode Fuzzy Hash: c27e747d31a8a9c3e471cb83d60089fd848ec944755af3beddd8ef02cc67eb58
                  • Instruction Fuzzy Hash: 21D0A73670021C5FCF0567A8841489E7BDE9BCE1503018467D2058B210DD61CC10A3E1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7fad6b74341bb313efd8165fefbd28cc5651bef9786f5e6e15747707670c54b9
                  • Instruction ID: fa1ce4c8143009b3c6bc18e233a7e5b6d8f316752061e2ddda1ef56f6e05137f
                  • Opcode Fuzzy Hash: 7fad6b74341bb313efd8165fefbd28cc5651bef9786f5e6e15747707670c54b9
                  • Instruction Fuzzy Hash: 52C01222344428130A19325E641087F628F8ACA87820680AAE609C7384DD849C0203EA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 878f5ac13715109cfc4c78fc3432c6cb5356081cda7ebdbcb20d37e38fba6c8f
                  • Instruction ID: 12f43279bd9d6f496383bee4c899af569ee842d71734fe094f22385d190a83c6
                  • Opcode Fuzzy Hash: 878f5ac13715109cfc4c78fc3432c6cb5356081cda7ebdbcb20d37e38fba6c8f
                  • Instruction Fuzzy Hash: 3ED0973121B200AFFF034360E80E2E03F786752392F048483E00CC106285580004CB21
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 05ddccd8e7b5932171173195e3c846f3a747a8b2bccd5cf323aa59201865e80b
                  • Instruction ID: 94bb64d54a4978c23bfe9f2b4a531a98ac25b308423db4b985eec306d2fd5b14
                  • Opcode Fuzzy Hash: 05ddccd8e7b5932171173195e3c846f3a747a8b2bccd5cf323aa59201865e80b
                  • Instruction Fuzzy Hash: A9D0A7722595944FDB069768E5155AB3BD09B8B112B0604FBD105DB262C518CC00C795
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 75613d8c0e3d264fc67330eb06d80b8f662704d31cf882793932151136777cc7
                  • Instruction ID: 1ba1341daf32b61929d0a9034f95f5ccec65bbf8f00c6433fb4bf06a16a69e7c
                  • Opcode Fuzzy Hash: 75613d8c0e3d264fc67330eb06d80b8f662704d31cf882793932151136777cc7
                  • Instruction Fuzzy Hash: 55D01771A07208CFEB118B68ED817E87B74FB9A354F0127E2D009A7151D7301E94CF01
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7475fc331d0a1474aaee70ec9431fdfa8580b8b64195855987e8bb852e043020
                  • Instruction ID: 0adf1b4d6c5db0cdf57cf9f1f2364a4f54173f2f09a495cb75df5b9248a251d3
                  • Opcode Fuzzy Hash: 7475fc331d0a1474aaee70ec9431fdfa8580b8b64195855987e8bb852e043020
                  • Instruction Fuzzy Hash: 43D0A73210030CEFCB41AFE8E800FA937A9BB48708F64E160FA0C49101C733A492C750
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 13c028d338b5cd317c208d536e6614f10a59ee864fca3d33f3882b1f118441e8
                  • Instruction ID: 56aea1eb3e50d0a0b9405059b550177acb80ab447af72b4ddc72d0262bd2e951
                  • Opcode Fuzzy Hash: 13c028d338b5cd317c208d536e6614f10a59ee864fca3d33f3882b1f118441e8
                  • Instruction Fuzzy Hash: 48D0C93308060DBBCF01AED1DC02F9A3B66AB54755F44C514FA04196A2C372D5E2AB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad2c7217c7d3b99548b3fd458c3b744112b7308ca97b4013bd7545b8b724f047
                  • Instruction ID: 1fb76960619e186996db274e57c72a176b2276cbf8e385ad93703ebd6021b330
                  • Opcode Fuzzy Hash: ad2c7217c7d3b99548b3fd458c3b744112b7308ca97b4013bd7545b8b724f047
                  • Instruction Fuzzy Hash: 0BD0123E140104DFC300DA78C98AF907BB4EB08619F1901B9EE49DB762D62BFC0BC6A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b7e2dc72e1de78e9ba6f6705d6aff2eb9cb008fabeeb781d40488eb5e5427e8f
                  • Instruction ID: c721a014ae68e8c292d005e3476e499c4b84dfdb0b395bee968128260e87ad9c
                  • Opcode Fuzzy Hash: b7e2dc72e1de78e9ba6f6705d6aff2eb9cb008fabeeb781d40488eb5e5427e8f
                  • Instruction Fuzzy Hash: 60C012313040288BC608AA5CE4088AA37DC9F8AA64B0100AAE20ACB321CAA1EC0047E6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7454e66bb072db4e8c8e483b5b4e56fa1af0286d04c4d1960f700c36264e31ca
                  • Instruction ID: 9ea4a80b5ca1badea186c5328722843dd103c0b35adbf62a1ff1a2872d44064a
                  • Opcode Fuzzy Hash: 7454e66bb072db4e8c8e483b5b4e56fa1af0286d04c4d1960f700c36264e31ca
                  • Instruction Fuzzy Hash: 78D0C9B69631098FCE218637E54A3707B39E384715F046616B6028AAC5EB6C4888C601
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4eda66b7ea9fb66b4c2b3bb062db2387581b2b35cb432d7c38b42cb1f8902ac7
                  • Instruction ID: c9453090f6808cf6ac411b270094c7f36619bc5b330b2416d46be30170e0e2a6
                  • Opcode Fuzzy Hash: 4eda66b7ea9fb66b4c2b3bb062db2387581b2b35cb432d7c38b42cb1f8902ac7
                  • Instruction Fuzzy Hash: B6C08C36200308FFDB80AFE4CC00D66776DAB48B18F90D140FB080E211C272E9A2DBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8042774f88fe99dd0c4708245e751e9f3169e4fbad30de102121db7334c8d319
                  • Instruction ID: fec9e448d0984389c02b5586282aa563b59e86726762da3a46bab4c2c436631f
                  • Opcode Fuzzy Hash: 8042774f88fe99dd0c4708245e751e9f3169e4fbad30de102121db7334c8d319
                  • Instruction Fuzzy Hash: 5AC04C3214020DBBCF01AED1DC01EAA3B2AAB44754F44C511FB1419561C773D9B1FB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fa74dcd3ce6594ff5af33ea5aea5be66c3eb53b1ff7d7d0dc8b6f23fac98c280
                  • Instruction ID: 73d2834fa8230d33c5927a5a768141723cd48be5c960f9bf81ba2c40fd6f95f9
                  • Opcode Fuzzy Hash: fa74dcd3ce6594ff5af33ea5aea5be66c3eb53b1ff7d7d0dc8b6f23fac98c280
                  • Instruction Fuzzy Hash: 4BC08CA084C6008BE3806BD0A440386A6D1CFC6280F10C428819886624C938C8414362
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c29356a15d7f03c3b96a52001a202e38d268f25f0b99395bd0204651d06fa24e
                  • Instruction ID: caeed53c42ead18504d36229d6ad44bcb8560e6634745d6cabe788bbc2d522f8
                  • Opcode Fuzzy Hash: c29356a15d7f03c3b96a52001a202e38d268f25f0b99395bd0204651d06fa24e
                  • Instruction Fuzzy Hash: FDC08C3000320A9BFB086B98E60F7243AB87788382F808010E00D404106AA84060DF56
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1b56395d49026866c44a01cf3d8ce008b24f68c93ee16e98fe3d1c0150d8f443
                  • Instruction ID: 6570e087ec2d4d5d4910610ff4bcfb5ee323ef6790975e8d81e78246fe587cd2
                  • Opcode Fuzzy Hash: 1b56395d49026866c44a01cf3d8ce008b24f68c93ee16e98fe3d1c0150d8f443
                  • Instruction Fuzzy Hash: 72C09B7B4441006FC7419740DD91F4977B1FB55311F89C451A58447131DA65D43EFF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2aa190de86caae26b4a9c64fc8df8a6de08ce8bc10d090816a0002a0e5fa700d
                  • Instruction ID: 06ec7c3fb21614f6b085b75940c6009494b96b1a216c062de543c4536b3b834a
                  • Opcode Fuzzy Hash: 2aa190de86caae26b4a9c64fc8df8a6de08ce8bc10d090816a0002a0e5fa700d
                  • Instruction Fuzzy Hash: 87C04C76065100AE8601EB54C9C4C2D7A91FF55340B80DC51A14846020CE618929EF42
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a31a82d30ba440df56ca92515fbddc8f5d2d2f14ccc101db3e456efe6c7331d0
                  • Instruction ID: 67f7c08ba5e031178dd3455c6ad5e901d58b11aa411d40577a4e052eaa3e2c9e
                  • Opcode Fuzzy Hash: a31a82d30ba440df56ca92515fbddc8f5d2d2f14ccc101db3e456efe6c7331d0
                  • Instruction Fuzzy Hash: 8BC04C34140104CFC200DB58D449D9077A8AB48615B1540A5E5094B332DA22FC01CA50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fa63d5d714b5907fb9d3fadb9b2dc0245fa92ea44dcd6d76eb364b383299ee6e
                  • Instruction ID: 02cc84a9164badb51e070d9bc21468af29fb24af4e254f8f515621e9967af01f
                  • Opcode Fuzzy Hash: fa63d5d714b5907fb9d3fadb9b2dc0245fa92ea44dcd6d76eb364b383299ee6e
                  • Instruction Fuzzy Hash: 02B0125104000007EF409138E4363473D3193C4A03F052044DC4DC0510C40F7C08DE31
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8c61b73d085bcd77f4d71907ecfbec90565b8ddb4f6cc19810520ab83de824b7
                  • Instruction ID: 006f7c893c90a4b0d4d6c682247fb7e4879e09684486af38c9d2a22e04e3d623
                  • Opcode Fuzzy Hash: 8c61b73d085bcd77f4d71907ecfbec90565b8ddb4f6cc19810520ab83de824b7
                  • Instruction Fuzzy Hash: D2B012F6174540F6D10536644CC096F6D11EBE5740BC0DC03729440450C8708438F61F
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: PHsq
                  • API String ID: 0-3083888473
                  • Opcode ID: 158345391ac9bc246eed11d2b04c3faaa211eb0ad76d79bc1e7903243e3ae7cd
                  • Instruction ID: 654328e054e0b3f038e84c1a10850ab7def022539119ca61d14265bb473c87ee
                  • Opcode Fuzzy Hash: 158345391ac9bc246eed11d2b04c3faaa211eb0ad76d79bc1e7903243e3ae7cd
                  • Instruction Fuzzy Hash: 8A726DB0E1021ACFCB14CFA8C884AADBBF6FF85304F168599D549AB255D7709DA1CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9aad5d52d9b9ebf55759d3159e0199ed281cbf24d3febb79a98c5e4e2557e956
                  • Instruction ID: ccb9198c064392ddf45847f5ee451af913c19f771be6fb8f0234f01132a23548
                  • Opcode Fuzzy Hash: 9aad5d52d9b9ebf55759d3159e0199ed281cbf24d3febb79a98c5e4e2557e956
                  • Instruction Fuzzy Hash: 90E1F6B4E005198FDB64DFA9C5909EEBBB2FF89304F24916AD814AB355D730AD42CF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2041773880.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_75b0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7ce7eda483fd000ab61b7e7923ef77033ef21cd08257989777283af16c2a03b2
                  • Instruction ID: 846e47a122c3cc809715a33202e0e95f3656fb31ee6f97d96bd8bdacd5bb9496
                  • Opcode Fuzzy Hash: 7ce7eda483fd000ab61b7e7923ef77033ef21cd08257989777283af16c2a03b2
                  • Instruction Fuzzy Hash: DEE1E8B4E005198FDB24DFA9C5909EEBBB2FF89304F24916AD815AB355D730A942CF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4a23b10402d13c0f3fb375d307e22cb50ea7ddd016a3d73bbf644dba18f55eeb
                  • Instruction ID: 31b8cafe1bfad934a64048660c9aeb162eadefb22b2fce843a68c7261311fd3d
                  • Opcode Fuzzy Hash: 4a23b10402d13c0f3fb375d307e22cb50ea7ddd016a3d73bbf644dba18f55eeb
                  • Instruction Fuzzy Hash: ECE10A74E141198FDB14DFA9C6809AEFBB2FF89304F249269E814AB355D731AD42CF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fc972c22ed76e5e26f2f4a538398102b265ad445a55fc1273d10c46785b6bdae
                  • Instruction ID: a3199906720b82013582f745980072aab5f05caed51ae5700354dca2dc3616ae
                  • Opcode Fuzzy Hash: fc972c22ed76e5e26f2f4a538398102b265ad445a55fc1273d10c46785b6bdae
                  • Instruction Fuzzy Hash: C2E10774E101598FDB14DFA9C6809AEFBB2FF89304F649269E814AB355D730AD42CF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c4a485427f3d1b00b4254bfdf310fe17f1bd2cf3251a12f29d966c85ddf3c4e
                  • Instruction ID: f1a2e2a706f13311fce455eaba455d0ea1a424df9e59ef6f2d9a21a120aa0041
                  • Opcode Fuzzy Hash: 4c4a485427f3d1b00b4254bfdf310fe17f1bd2cf3251a12f29d966c85ddf3c4e
                  • Instruction Fuzzy Hash: 24E1E874E101198FDB14DFA9C6909AEFBB2FF89304F649269D814AB355D730AD42CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9832f4178c8829c3702a535a7dbbd63a2dc977d4e4b54b565eebffe2488b1976
                  • Instruction ID: 9655d625e3a896f5bdea14002c53f2cf8c3ff9ccb2d87d8d9f0ac4a95ff09c26
                  • Opcode Fuzzy Hash: 9832f4178c8829c3702a535a7dbbd63a2dc977d4e4b54b565eebffe2488b1976
                  • Instruction Fuzzy Hash: 19D13871C10A1A8ADB14EB74D990BA9B375FFD9300F20D79AD4097B250EB706AC4CF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 70aee62f347f3872f54990bc8a54bb31dad19f0e59be49eaae3dac3ed08b3703
                  • Instruction ID: 832f7011c5a1277e499eee08b75c6c2f4e6558841e86469490f494186aef8151
                  • Opcode Fuzzy Hash: 70aee62f347f3872f54990bc8a54bb31dad19f0e59be49eaae3dac3ed08b3703
                  • Instruction Fuzzy Hash: A5D11771C10A1ACADB14EB74D990AA9B375FFD9300F60D79AE4097B250EB706AC5CF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9abe4cffb46e53add77ce257de24cd12293d23db8838db59a5d40c8596608d2a
                  • Instruction ID: ce2e7e709298910a569d0ed69c31a0de8f22ddb1378902d745cb38ff59b908f9
                  • Opcode Fuzzy Hash: 9abe4cffb46e53add77ce257de24cd12293d23db8838db59a5d40c8596608d2a
                  • Instruction Fuzzy Hash: 21512A74E102198FDB14CFA9C6805EEBBB6EF89304F64826AD418AB255D7309D42CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042411421.00000000092E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 092E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_92e0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b4266ba2c35be7e66168aa71d31e6434887963fa44ddc0e09aced428d832d225
                  • Instruction ID: 8d24599f1bbded8e9e8734359c9013c49ab4502f13bba786dd4f74fc87166fc0
                  • Opcode Fuzzy Hash: b4266ba2c35be7e66168aa71d31e6434887963fa44ddc0e09aced428d832d225
                  • Instruction Fuzzy Hash: D7512975E112598BDB14CFAAC6805EEFBB2FF89304F64816AD418AB355D7309942CFA0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'sq$4'sq$4'sq$4'sq$4'sq$4'sq
                  • API String ID: 0-2534308389
                  • Opcode ID: 2be01f0fd7fa1ac58ad408d16271a28e89656200b1769b5173501243fd85211c
                  • Instruction ID: cbc832cc812a20a29911ed811c78bca5be622f160ef5810b9dd504b9d9f16bed
                  • Opcode Fuzzy Hash: 2be01f0fd7fa1ac58ad408d16271a28e89656200b1769b5173501243fd85211c
                  • Instruction Fuzzy Hash: AA413E7090250ACFCB09EF74F49556F7BB2FB8A300BA08669D149DF3A5EB346905CB80
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2042086887.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_79f0000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'sq$4'sq$4'sq$4'sq$4'sq$4'sq
                  • API String ID: 0-2534308389
                  • Opcode ID: e46648d8d1bef9021a7a6372bc165a0549d64528e5d0fe02865a61d8cd5dc747
                  • Instruction ID: 636a96bdf895e86aac79a09763d48c3376bc1b7d0b1451a5bed5375acb8f2e1c
                  • Opcode Fuzzy Hash: e46648d8d1bef9021a7a6372bc165a0549d64528e5d0fe02865a61d8cd5dc747
                  • Instruction Fuzzy Hash: 88410C70A0250ADFCB09EF75F49556F7BB2FB8A300B608669D149DB2A5EB306905CB81

                  Execution Graph

                  Execution Coverage:4.6%
                  Dynamic/Decrypted Code Coverage:4.2%
                  Signature Coverage:6%
                  Total number of Nodes:1700
                  Total number of Limit Nodes:57
                  execution_graph 53072 415d41 53087 41b411 53072->53087 53074 415d4a 53098 4020f6 53074->53098 53079 4170c4 53122 401e8d 53079->53122 53083 401fd8 11 API calls 53084 4170d9 53083->53084 53085 401fd8 11 API calls 53084->53085 53086 4170e5 53085->53086 53128 4020df 53087->53128 53092 41b456 InternetReadFile 53096 41b479 53092->53096 53093 41b4a6 InternetCloseHandle InternetCloseHandle 53095 41b4b8 53093->53095 53095->53074 53096->53092 53096->53093 53097 401fd8 11 API calls 53096->53097 53139 4020b7 53096->53139 53097->53096 53099 40210c 53098->53099 53100 4023ce 11 API calls 53099->53100 53101 402126 53100->53101 53102 402569 28 API calls 53101->53102 53103 402134 53102->53103 53104 404aa1 53103->53104 53105 404ab4 53104->53105 53206 40520c 53105->53206 53107 404ac9 _Yarn 53108 404b40 WaitForSingleObject 53107->53108 53109 404b20 53107->53109 53111 404b56 53108->53111 53110 404b32 send 53109->53110 53112 404b7b 53110->53112 53212 4210cb 54 API calls 53111->53212 53115 401fd8 11 API calls 53112->53115 53114 404b69 SetEvent 53114->53112 53116 404b83 53115->53116 53117 401fd8 11 API calls 53116->53117 53118 404b8b 53117->53118 53118->53079 53119 401fd8 53118->53119 53120 4023ce 11 API calls 53119->53120 53121 401fe1 53120->53121 53121->53079 53123 402163 53122->53123 53127 40219f 53123->53127 53230 402730 11 API calls 53123->53230 53125 402184 53231 402712 11 API calls std::_Deallocate 53125->53231 53127->53083 53129 4020e7 53128->53129 53145 4023ce 53129->53145 53131 4020f2 53132 43bda0 53131->53132 53137 4461b8 __Getctype 53132->53137 53133 4461f6 53161 44062d 20 API calls __dosmaperr 53133->53161 53134 4461e1 RtlAllocateHeap 53136 41b42f InternetOpenW InternetOpenUrlW 53134->53136 53134->53137 53136->53092 53137->53133 53137->53134 53160 443001 7 API calls 2 library calls 53137->53160 53140 4020bf 53139->53140 53141 4023ce 11 API calls 53140->53141 53142 4020ca 53141->53142 53162 40250a 53142->53162 53144 4020d9 53144->53096 53146 402428 53145->53146 53147 4023d8 53145->53147 53146->53131 53147->53146 53149 4027a7 53147->53149 53150 402e21 53149->53150 53153 4016b4 53150->53153 53152 402e30 53152->53146 53154 4016cb 53153->53154 53155 4016c6 53153->53155 53154->53155 53156 4016f3 53154->53156 53159 43bd68 11 API calls _abort 53155->53159 53156->53152 53158 43bd67 53159->53158 53160->53137 53161->53136 53163 40251a 53162->53163 53164 402520 53163->53164 53165 402535 53163->53165 53169 402569 53164->53169 53179 4028e8 53165->53179 53168 402533 53168->53144 53190 402888 53169->53190 53171 40257d 53172 402592 53171->53172 53173 4025a7 53171->53173 53195 402a34 22 API calls 53172->53195 53175 4028e8 28 API calls 53173->53175 53178 4025a5 53175->53178 53176 40259b 53196 4029da 22 API calls 53176->53196 53178->53168 53180 4028f1 53179->53180 53181 402953 53180->53181 53182 4028fb 53180->53182 53204 4028a4 22 API calls 53181->53204 53185 402904 53182->53185 53187 402917 53182->53187 53198 402cae 53185->53198 53188 402915 53187->53188 53189 4023ce 11 API calls 53187->53189 53188->53168 53189->53188 53191 402890 53190->53191 53192 402898 53191->53192 53197 402ca3 22 API calls 53191->53197 53192->53171 53195->53176 53196->53178 53199 402cb8 __EH_prolog 53198->53199 53205 402e54 22 API calls 53199->53205 53201 4023ce 11 API calls 53203 402d92 53201->53203 53202 402d24 53202->53201 53203->53188 53205->53202 53207 405214 53206->53207 53208 4023ce 11 API calls 53207->53208 53209 40521f 53208->53209 53213 405234 53209->53213 53211 40522e 53211->53107 53212->53114 53214 405240 53213->53214 53215 40526e 53213->53215 53216 4028e8 28 API calls 53214->53216 53229 4028a4 22 API calls 53215->53229 53219 40524a 53216->53219 53219->53211 53230->53125 53231->53127 53232 426a77 53233 426a8c 53232->53233 53240 426b1e 53232->53240 53234 426b83 53233->53234 53235 426b0e 53233->53235 53236 426bae 53233->53236 53233->53240 53243 426ad9 53233->53243 53244 426b4e 53233->53244 53246 426bd5 53233->53246 53260 424f6e 49 API calls _Yarn 53233->53260 53234->53236 53264 425781 21 API calls 53234->53264 53235->53240 53235->53244 53262 424f6e 49 API calls _Yarn 53235->53262 53236->53240 53236->53246 53248 425b72 53236->53248 53243->53235 53243->53240 53261 41fbfd 52 API calls 53243->53261 53244->53234 53244->53240 53263 41fbfd 52 API calls 53244->53263 53246->53240 53265 4261e6 28 API calls 53246->53265 53249 425b91 ___scrt_fastfail 53248->53249 53251 425ba0 53249->53251 53254 425bc5 53249->53254 53266 41ec4c 21 API calls 53249->53266 53251->53254 53259 425ba5 53251->53259 53267 420669 46 API calls 53251->53267 53254->53246 53255 425bae 53255->53254 53274 424d96 21 API calls 2 library calls 53255->53274 53257 425c48 53257->53254 53268 432f55 53257->53268 53259->53254 53259->53255 53273 41daf0 49 API calls 53259->53273 53260->53243 53261->53243 53262->53244 53263->53244 53264->53236 53265->53240 53266->53251 53267->53257 53269 432f63 53268->53269 53270 432f5f 53268->53270 53271 43bda0 _Yarn 21 API calls 53269->53271 53270->53259 53272 432f68 53271->53272 53272->53259 53273->53255 53274->53254 53275 1000c7a7 53276 1000c7be 53275->53276 53281 1000c82c 53275->53281 53276->53281 53287 1000c7e6 GetModuleHandleA 53276->53287 53277 1000c872 53278 1000c835 GetModuleHandleA 53282 1000c83f 53278->53282 53280 1000c7dd 53280->53281 53280->53282 53284 1000c800 GetProcAddress 53280->53284 53281->53277 53281->53278 53281->53282 53282->53281 53283 1000c85f GetProcAddress 53282->53283 53283->53281 53284->53281 53285 1000c80d VirtualProtect 53284->53285 53285->53281 53286 1000c81c VirtualProtect 53285->53286 53286->53281 53288 1000c7ef 53287->53288 53295 1000c82c 53287->53295 53299 1000c803 GetProcAddress 53288->53299 53290 1000c872 53291 1000c835 GetModuleHandleA 53297 1000c83f 53291->53297 53292 1000c7f4 53293 1000c800 GetProcAddress 53292->53293 53292->53295 53294 1000c80d VirtualProtect 53293->53294 53293->53295 53294->53295 53296 1000c81c VirtualProtect 53294->53296 53295->53290 53295->53291 53295->53297 53296->53295 53297->53295 53298 1000c85f GetProcAddress 53297->53298 53298->53295 53300 1000c82c 53299->53300 53301 1000c80d VirtualProtect 53299->53301 53303 1000c872 53300->53303 53304 1000c835 GetModuleHandleA 53300->53304 53301->53300 53302 1000c81c VirtualProtect 53301->53302 53302->53300 53306 1000c83f 53304->53306 53305 1000c85f GetProcAddress 53305->53306 53306->53300 53306->53305 53307 4165db 53318 401e65 53307->53318 53309 4165eb 53310 4020f6 28 API calls 53309->53310 53311 4165f6 53310->53311 53312 401e65 22 API calls 53311->53312 53313 416601 53312->53313 53314 4020f6 28 API calls 53313->53314 53315 41660c 53314->53315 53323 412965 53315->53323 53319 401e6d 53318->53319 53320 401e75 53319->53320 53342 402158 22 API calls 53319->53342 53320->53309 53343 40482d 53323->53343 53325 412979 53350 4048c8 connect 53325->53350 53329 41299a 53415 402f10 53329->53415 53332 404aa1 61 API calls 53333 4129ae 53332->53333 53334 401fd8 11 API calls 53333->53334 53335 4129b6 53334->53335 53420 404c10 53335->53420 53338 401fd8 11 API calls 53339 4129cc 53338->53339 53340 401fd8 11 API calls 53339->53340 53341 4129d4 53340->53341 53344 404846 socket 53343->53344 53345 404839 53343->53345 53347 404860 CreateEventW 53344->53347 53348 404842 53344->53348 53438 40489e WSAStartup 53345->53438 53347->53325 53348->53325 53349 40483e 53349->53344 53349->53348 53351 404a1b 53350->53351 53352 4048ee 53350->53352 53353 404a21 WSAGetLastError 53351->53353 53354 40497e 53351->53354 53352->53354 53355 404923 53352->53355 53439 40531e 53352->53439 53353->53354 53356 404a31 53353->53356 53410 402f31 53354->53410 53474 420cf1 27 API calls 53355->53474 53358 404932 53356->53358 53359 404a36 53356->53359 53364 402093 28 API calls 53358->53364 53485 41cb72 30 API calls 53359->53485 53361 40490f 53444 402093 53361->53444 53363 40492b 53363->53358 53367 404941 53363->53367 53368 404a80 53364->53368 53366 404a40 53486 4052fd 28 API calls 53366->53486 53376 404950 53367->53376 53377 404987 53367->53377 53371 402093 28 API calls 53368->53371 53374 404a8f 53371->53374 53378 41b580 80 API calls 53374->53378 53381 402093 28 API calls 53376->53381 53482 421ad1 54 API calls 53377->53482 53378->53354 53382 40495f 53381->53382 53385 402093 28 API calls 53382->53385 53384 40498f 53387 4049c4 53384->53387 53388 404994 53384->53388 53389 40496e 53385->53389 53484 420e97 28 API calls 53387->53484 53392 402093 28 API calls 53388->53392 53393 41b580 80 API calls 53389->53393 53395 4049a3 53392->53395 53396 404973 53393->53396 53394 4049cc 53397 4049f9 CreateEventW CreateEventW 53394->53397 53399 402093 28 API calls 53394->53399 53398 402093 28 API calls 53395->53398 53475 420d31 53396->53475 53397->53354 53400 4049b2 53398->53400 53403 4049e2 53399->53403 53401 41b580 80 API calls 53400->53401 53404 4049b7 53401->53404 53405 402093 28 API calls 53403->53405 53483 421143 52 API calls 53404->53483 53407 4049f1 53405->53407 53408 41b580 80 API calls 53407->53408 53409 4049f6 53408->53409 53409->53397 53411 4020df 11 API calls 53410->53411 53412 402f3d 53411->53412 53413 4032a0 28 API calls 53412->53413 53414 402f59 53413->53414 53414->53329 53539 401fb0 53415->53539 53417 402f1e 53418 402055 11 API calls 53417->53418 53419 402f2d 53418->53419 53419->53332 53421 4020df 11 API calls 53420->53421 53422 404c27 53421->53422 53423 4020df 11 API calls 53422->53423 53429 404c30 53423->53429 53424 43bda0 _Yarn 21 API calls 53424->53429 53426 4020b7 28 API calls 53426->53429 53428 404ca1 53570 404e26 WaitForSingleObject 53428->53570 53429->53424 53429->53426 53429->53428 53431 401fd8 11 API calls 53429->53431 53542 404b96 53429->53542 53548 401fe2 53429->53548 53557 404cc3 53429->53557 53431->53429 53433 401fd8 11 API calls 53434 404cb1 53433->53434 53435 401fd8 11 API calls 53434->53435 53436 404cba 53435->53436 53436->53338 53438->53349 53440 4020df 11 API calls 53439->53440 53441 40532a 53440->53441 53487 4032a0 53441->53487 53443 405346 53443->53361 53445 40209b 53444->53445 53446 4023ce 11 API calls 53445->53446 53447 4020a6 53446->53447 53491 4024ed 53447->53491 53450 41b580 53451 41b631 53450->53451 53452 41b596 GetLocalTime 53450->53452 53453 401fd8 11 API calls 53451->53453 53454 40531e 28 API calls 53452->53454 53455 41b639 53453->53455 53456 41b5d8 53454->53456 53458 401fd8 11 API calls 53455->53458 53495 406383 53456->53495 53460 41b641 53458->53460 53460->53355 53461 402f10 28 API calls 53462 41b5f0 53461->53462 53463 406383 28 API calls 53462->53463 53464 41b5fc 53463->53464 53500 40723b 77 API calls 53464->53500 53466 41b60a 53467 401fd8 11 API calls 53466->53467 53468 41b616 53467->53468 53469 401fd8 11 API calls 53468->53469 53470 41b61f 53469->53470 53471 401fd8 11 API calls 53470->53471 53472 41b628 53471->53472 53473 401fd8 11 API calls 53472->53473 53473->53451 53474->53363 53476 41e7a2 53475->53476 53477 420d39 53475->53477 53478 41e7b0 53476->53478 53537 41d8ec DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53476->53537 53477->53354 53538 41e4d2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53478->53538 53481 41e7b7 53482->53384 53483->53396 53484->53394 53485->53366 53488 4032aa 53487->53488 53489 4032c9 53488->53489 53490 4028e8 28 API calls 53488->53490 53489->53443 53490->53489 53492 4024f9 53491->53492 53493 40250a 28 API calls 53492->53493 53494 4020b1 53493->53494 53494->53450 53501 4051ef 53495->53501 53497 406391 53505 402055 53497->53505 53500->53466 53502 4051fb 53501->53502 53511 405274 53502->53511 53504 405208 53504->53497 53506 402061 53505->53506 53507 4023ce 11 API calls 53506->53507 53508 40207b 53507->53508 53533 40267a 53508->53533 53512 405282 53511->53512 53513 405288 53512->53513 53514 40529e 53512->53514 53522 4025f0 53513->53522 53516 4052f5 53514->53516 53518 4052b6 53514->53518 53531 4028a4 22 API calls 53516->53531 53520 4028e8 28 API calls 53518->53520 53521 40529c 53518->53521 53520->53521 53521->53504 53523 402888 22 API calls 53522->53523 53524 402602 53523->53524 53525 402672 53524->53525 53526 402629 53524->53526 53532 4028a4 22 API calls 53525->53532 53529 4028e8 28 API calls 53526->53529 53530 40263b 53526->53530 53529->53530 53530->53521 53534 40268b 53533->53534 53535 4023ce 11 API calls 53534->53535 53536 40208d 53535->53536 53536->53461 53537->53478 53538->53481 53540 4025f0 28 API calls 53539->53540 53541 401fbd 53540->53541 53541->53417 53543 404ba0 WaitForSingleObject 53542->53543 53544 404bcd recv 53542->53544 53584 421107 54 API calls 53543->53584 53546 404be0 53544->53546 53546->53429 53547 404bbc SetEvent 53547->53546 53549 401ff1 53548->53549 53556 402039 53548->53556 53550 4023ce 11 API calls 53549->53550 53551 401ffa 53550->53551 53552 40203c 53551->53552 53553 402015 53551->53553 53554 40267a 11 API calls 53552->53554 53585 403098 28 API calls 53553->53585 53554->53556 53556->53429 53558 4020df 11 API calls 53557->53558 53568 404cde 53558->53568 53559 404e13 53560 401fd8 11 API calls 53559->53560 53561 404e1c 53560->53561 53561->53429 53562 4041a2 28 API calls 53562->53568 53563 401fe2 28 API calls 53563->53568 53564 401fd8 11 API calls 53564->53568 53565 4020f6 28 API calls 53565->53568 53568->53559 53568->53562 53568->53563 53568->53564 53568->53565 53586 4129da 53568->53586 53630 401fc0 53568->53630 53571 404e40 SetEvent FindCloseChangeNotification 53570->53571 53572 404e57 closesocket 53570->53572 53573 404ca8 53571->53573 53574 404e64 53572->53574 53573->53433 53575 404e73 53574->53575 53576 404e7a 53574->53576 54157 4050e4 84 API calls 53575->54157 53578 404e8c WaitForSingleObject 53576->53578 53579 404ece SetEvent CloseHandle 53576->53579 53580 420d31 3 API calls 53578->53580 53579->53573 53581 404e9b SetEvent WaitForSingleObject 53580->53581 53582 420d31 3 API calls 53581->53582 53583 404eb3 SetEvent FindCloseChangeNotification FindCloseChangeNotification 53582->53583 53583->53579 53584->53547 53585->53556 53587 4129ec 53586->53587 53634 4041a2 53587->53634 53590 4020f6 28 API calls 53591 412a0e 53590->53591 53592 4020f6 28 API calls 53591->53592 53593 412a1d 53592->53593 53637 41beac 53593->53637 53596 412ace 53598 401e8d 11 API calls 53596->53598 53597 401e65 22 API calls 53599 412a3d 53597->53599 53600 412ad7 53598->53600 53601 4020f6 28 API calls 53599->53601 53602 401fd8 11 API calls 53600->53602 53604 412a48 53601->53604 53603 412ae0 53602->53603 53605 401fd8 11 API calls 53603->53605 53606 401e65 22 API calls 53604->53606 53607 412ae8 53605->53607 53608 412a53 53606->53608 53607->53568 53609 4020f6 28 API calls 53608->53609 53610 412a5e 53609->53610 53611 401e65 22 API calls 53610->53611 53612 412a69 53611->53612 53613 4020f6 28 API calls 53612->53613 53614 412a74 53613->53614 53615 401e65 22 API calls 53614->53615 53616 412a7f 53615->53616 53617 4020f6 28 API calls 53616->53617 53618 412a8a 53617->53618 53619 401e65 22 API calls 53618->53619 53620 412a95 53619->53620 53621 4020f6 28 API calls 53620->53621 53622 412aa0 53621->53622 53623 401e65 22 API calls 53622->53623 53624 412aae 53623->53624 53625 4020f6 28 API calls 53624->53625 53626 412ab9 53625->53626 53659 412aef GetModuleFileNameW 53626->53659 53629 404e26 99 API calls 53629->53596 53631 401fd2 CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 53630->53631 53632 401fc9 53630->53632 53631->53568 54013 415b25 53631->54013 54012 4025e0 28 API calls 53632->54012 53806 40423a 53634->53806 53638 4020df 11 API calls 53637->53638 53658 41bebf 53638->53658 53639 41bf2f 53640 401fd8 11 API calls 53639->53640 53641 41bf61 53640->53641 53642 401fd8 11 API calls 53641->53642 53644 41bf69 53642->53644 53643 41bf31 53645 4041a2 28 API calls 53643->53645 53647 401fd8 11 API calls 53644->53647 53648 41bf3d 53645->53648 53646 4041a2 28 API calls 53646->53658 53649 412a26 53647->53649 53650 401fe2 28 API calls 53648->53650 53649->53596 53649->53597 53652 41bf46 53650->53652 53651 401fe2 28 API calls 53651->53658 53653 401fd8 11 API calls 53652->53653 53655 41bf4e 53653->53655 53654 401fd8 11 API calls 53654->53658 53813 41cec5 28 API calls 53655->53813 53658->53639 53658->53643 53658->53646 53658->53651 53658->53654 53812 41cec5 28 API calls 53658->53812 53660 4020df 11 API calls 53659->53660 53661 412b1a 53660->53661 53662 4020df 11 API calls 53661->53662 53663 412b26 53662->53663 53664 4020df 11 API calls 53663->53664 53685 412b32 53664->53685 53665 401fd8 11 API calls 53665->53685 53666 41ba09 43 API calls 53666->53685 53667 40da23 32 API calls 53667->53685 53668 40417e 28 API calls 53668->53685 53669 4185a3 31 API calls 53669->53685 53670 412c58 Sleep 53670->53685 53671 4042fc 79 API calls 53671->53685 53672 40431d 28 API calls 53672->53685 53673 403014 28 API calls 53673->53685 53674 401f09 11 API calls 53674->53685 53675 412cfa Sleep 53675->53685 53676 412d9c Sleep 53676->53685 53677 41c516 32 API calls 53677->53685 53678 412dff DeleteFileW 53678->53685 53679 412e36 DeleteFileW 53679->53685 53680 412e88 Sleep 53680->53685 53681 412e72 DeleteFileW 53681->53685 53682 412f01 53683 401f09 11 API calls 53682->53683 53684 412f0d 53683->53684 53686 401f09 11 API calls 53684->53686 53685->53665 53685->53666 53685->53667 53685->53668 53685->53669 53685->53670 53685->53671 53685->53672 53685->53673 53685->53674 53685->53675 53685->53676 53685->53677 53685->53678 53685->53679 53685->53680 53685->53681 53685->53682 53690 412ecd Sleep 53685->53690 53687 412f19 53686->53687 53688 401f09 11 API calls 53687->53688 53689 412f25 53688->53689 53814 40b93f 53689->53814 53832 401f09 53690->53832 53693 412f38 53695 4020f6 28 API calls 53693->53695 53694 401f09 11 API calls 53697 412edd 53694->53697 53696 412f58 53695->53696 53820 413268 53696->53820 53697->53685 53697->53694 53699 412eff 53697->53699 53699->53689 53701 401f09 11 API calls 53702 412f6f 53701->53702 53703 4130e3 53702->53703 53704 412f8f 53702->53704 53706 41bdaf 28 API calls 53703->53706 53835 41bdaf 53704->53835 53707 4130ec 53706->53707 53709 402f31 28 API calls 53707->53709 53711 413123 53709->53711 53713 402f10 28 API calls 53711->53713 53715 413132 53713->53715 53714 402f31 28 API calls 53716 412fe5 53714->53716 53717 402f10 28 API calls 53715->53717 53718 402f10 28 API calls 53716->53718 53719 41313e 53717->53719 53720 412ff4 53718->53720 53721 402f10 28 API calls 53719->53721 53722 402f10 28 API calls 53720->53722 53723 41314d 53721->53723 53724 413003 53722->53724 53725 402f10 28 API calls 53723->53725 53726 402f10 28 API calls 53724->53726 53727 41315c 53725->53727 53728 413012 53726->53728 53729 402f10 28 API calls 53727->53729 53730 402f10 28 API calls 53728->53730 53731 41316b 53729->53731 53732 413021 53730->53732 53733 402f10 28 API calls 53731->53733 53734 402f10 28 API calls 53732->53734 53735 41317a 53733->53735 53736 41302d 53734->53736 53846 402ea1 28 API calls 53735->53846 53737 402f10 28 API calls 53736->53737 53740 413039 53737->53740 53739 413184 53741 404aa1 61 API calls 53739->53741 53844 402ea1 28 API calls 53740->53844 53743 413191 53741->53743 53745 401fd8 11 API calls 53743->53745 53744 413048 53746 402f10 28 API calls 53744->53746 53747 41319d 53745->53747 53748 413054 53746->53748 53749 401fd8 11 API calls 53747->53749 53845 402ea1 28 API calls 53748->53845 53751 4131a9 53749->53751 53753 401fd8 11 API calls 53751->53753 53752 41305e 53754 404aa1 61 API calls 53752->53754 53755 4131b5 53753->53755 53756 41306b 53754->53756 53757 401fd8 11 API calls 53755->53757 53758 401fd8 11 API calls 53756->53758 53759 4131c1 53757->53759 53760 413074 53758->53760 53761 401fd8 11 API calls 53759->53761 53762 401fd8 11 API calls 53760->53762 53763 4131ca 53761->53763 53764 41307d 53762->53764 53765 401fd8 11 API calls 53763->53765 53766 401fd8 11 API calls 53764->53766 53767 4131d3 53765->53767 53768 413086 53766->53768 53770 401fd8 11 API calls 53767->53770 53769 401fd8 11 API calls 53768->53769 53772 41308f 53769->53772 53771 4130d7 53770->53771 53774 401fd8 11 API calls 53771->53774 53773 401fd8 11 API calls 53772->53773 53775 41309b 53773->53775 53776 4131e5 53774->53776 53777 401fd8 11 API calls 53775->53777 53778 401f09 11 API calls 53776->53778 53779 4130a7 53777->53779 53780 4131f1 53778->53780 53781 401fd8 11 API calls 53779->53781 53782 401fd8 11 API calls 53780->53782 53783 4130b3 53781->53783 53784 4131fd 53782->53784 53785 401fd8 11 API calls 53783->53785 53786 401fd8 11 API calls 53784->53786 53787 4130bf 53785->53787 53788 413209 53786->53788 53789 401fd8 11 API calls 53787->53789 53790 401fd8 11 API calls 53788->53790 53791 4130cb 53789->53791 53792 413215 53790->53792 53793 401fd8 11 API calls 53791->53793 53794 401fd8 11 API calls 53792->53794 53793->53771 53795 413221 53794->53795 53796 401fd8 11 API calls 53795->53796 53797 41322d 53796->53797 53798 401fd8 11 API calls 53797->53798 53799 413239 53798->53799 53800 401fd8 11 API calls 53799->53800 53801 413245 53800->53801 53802 401fd8 11 API calls 53801->53802 53803 413251 53802->53803 53804 401fd8 11 API calls 53803->53804 53805 412abe 53804->53805 53805->53629 53807 404243 53806->53807 53808 4023ce 11 API calls 53807->53808 53809 40424e 53808->53809 53810 402569 28 API calls 53809->53810 53811 4041b5 53810->53811 53811->53590 53812->53658 53813->53639 53815 40b947 53814->53815 53847 402252 53815->53847 53817 40b952 53851 40b967 53817->53851 53819 40b961 53819->53693 53821 4132a6 53820->53821 53823 413277 53820->53823 53822 4132b5 53821->53822 53873 10001c5b 53821->53873 53881 40417e 53822->53881 53877 411d2d 53823->53877 53828 401fd8 11 API calls 53830 412f63 53828->53830 53830->53701 53833 402252 11 API calls 53832->53833 53834 401f12 53833->53834 53834->53697 53836 41bdbc 53835->53836 53837 4020b7 28 API calls 53836->53837 53838 412f9b 53837->53838 53839 41bc1f 53838->53839 54003 441ed1 53839->54003 53842 402093 28 API calls 53843 412fb5 53842->53843 53843->53714 53844->53744 53845->53752 53846->53739 53848 40225c 53847->53848 53849 4022ac 53847->53849 53848->53849 53858 402779 11 API calls std::_Deallocate 53848->53858 53849->53817 53852 40b9a1 53851->53852 53853 40b973 53851->53853 53870 4028a4 22 API calls 53852->53870 53859 4027e6 53853->53859 53857 40b97d 53857->53819 53858->53849 53860 4027ef 53859->53860 53861 402851 53860->53861 53862 4027f9 53860->53862 53872 4028a4 22 API calls 53861->53872 53865 402802 53862->53865 53867 402815 53862->53867 53871 402aea 28 API calls __EH_prolog 53865->53871 53868 402813 53867->53868 53869 402252 11 API calls 53867->53869 53868->53857 53869->53868 53871->53868 53874 10001c6b ___scrt_fastfail 53873->53874 53887 100012ee 53874->53887 53876 10001c87 53876->53822 53929 411d39 53877->53929 53880 411fa2 22 API calls _Yarn 53880->53821 53882 404186 53881->53882 53883 402252 11 API calls 53882->53883 53884 404191 53883->53884 53982 4041bc 53884->53982 53888 10001324 ___scrt_fastfail 53887->53888 53889 100013b7 GetEnvironmentVariableW 53888->53889 53913 100010f1 53889->53913 53892 100010f1 57 API calls 53893 10001465 53892->53893 53894 100010f1 57 API calls 53893->53894 53895 10001479 53894->53895 53896 100010f1 57 API calls 53895->53896 53897 1000148d 53896->53897 53898 100010f1 57 API calls 53897->53898 53899 100014a1 53898->53899 53900 100010f1 57 API calls 53899->53900 53901 100014b5 lstrlenW 53900->53901 53902 100014d2 53901->53902 53903 100014d9 lstrlenW 53901->53903 53902->53876 53904 100010f1 57 API calls 53903->53904 53905 10001501 lstrlenW lstrcatW 53904->53905 53906 100010f1 57 API calls 53905->53906 53907 10001539 lstrlenW lstrcatW 53906->53907 53908 100010f1 57 API calls 53907->53908 53909 1000156b lstrlenW lstrcatW 53908->53909 53910 100010f1 57 API calls 53909->53910 53911 1000159d lstrlenW lstrcatW 53910->53911 53912 100010f1 57 API calls 53911->53912 53912->53902 53914 10001118 ___scrt_fastfail 53913->53914 53915 10001129 lstrlenW 53914->53915 53926 10002c40 53915->53926 53917 10001148 lstrcatW lstrlenW 53918 10001177 lstrlenW FindFirstFileW 53917->53918 53919 10001168 lstrlenW 53917->53919 53920 100011a0 53918->53920 53921 100011e1 53918->53921 53919->53918 53922 100011c7 FindNextFileW 53920->53922 53923 100011aa 53920->53923 53921->53892 53922->53920 53925 100011da FindClose 53922->53925 53923->53922 53928 10001000 57 API calls ___scrt_fastfail 53923->53928 53925->53921 53927 10002c57 53926->53927 53927->53917 53927->53927 53928->53923 53962 4117d7 53929->53962 53931 411d57 53932 411d6d SetLastError 53931->53932 53933 4117d7 SetLastError 53931->53933 53959 411d35 53931->53959 53932->53959 53934 411d8a 53933->53934 53934->53932 53936 411dac GetNativeSystemInfo 53934->53936 53934->53959 53937 411df2 53936->53937 53948 411dff SetLastError 53937->53948 53965 411cde VirtualAlloc 53937->53965 53940 411e22 53941 411e47 GetProcessHeap HeapAlloc 53940->53941 53975 411cde VirtualAlloc 53940->53975 53943 411e70 53941->53943 53944 411e5e 53941->53944 53947 4117d7 SetLastError 53943->53947 53976 411cf5 VirtualFree 53944->53976 53945 411e3a 53945->53941 53945->53948 53949 411eb9 53947->53949 53948->53959 53950 411f6b 53949->53950 53966 411cde VirtualAlloc 53949->53966 53977 4120b2 GetProcessHeap HeapFree 53950->53977 53953 411ed2 _Yarn 53967 4117ea SetLastError _Yarn ___scrt_fastfail 53953->53967 53955 411efe 53955->53950 53968 411b9a 26 API calls 53955->53968 53957 411f2b 53957->53950 53969 41198a 53957->53969 53959->53880 53960 411f36 53960->53950 53960->53959 53961 411f60 SetLastError 53960->53961 53961->53950 53963 4117e6 53962->53963 53964 4117db SetLastError 53962->53964 53963->53931 53964->53931 53965->53940 53966->53953 53967->53955 53968->53957 53973 4119b0 53969->53973 53970 411a99 53971 4118ed VirtualProtect 53970->53971 53972 411aab 53971->53972 53972->53960 53973->53970 53973->53972 53978 4118ed 53973->53978 53975->53945 53976->53948 53977->53959 53979 4118fe 53978->53979 53980 4118f6 53978->53980 53979->53980 53981 411971 VirtualProtect 53979->53981 53980->53973 53981->53980 53983 4041c8 53982->53983 53986 4041d9 53983->53986 53985 40419c 53985->53828 53987 4041e9 53986->53987 53988 404206 53987->53988 53989 4041ef 53987->53989 53990 4027e6 28 API calls 53988->53990 53993 404267 53989->53993 53992 404204 53990->53992 53992->53985 53994 402888 22 API calls 53993->53994 53995 40427b 53994->53995 53996 404290 53995->53996 53997 4042a5 53995->53997 53999 4042df 22 API calls 53996->53999 53998 4027e6 28 API calls 53997->53998 54002 4042a3 53998->54002 54000 404299 53999->54000 54001 402c48 22 API calls 54000->54001 54001->54002 54002->53992 54004 441edd 54003->54004 54007 441ccd 54004->54007 54006 41bc43 54006->53842 54008 441ce4 54007->54008 54010 441d1b _strftime 54008->54010 54011 44062d 20 API calls __dosmaperr 54008->54011 54010->54006 54011->54010 54012->53631 54014 4020f6 28 API calls 54013->54014 54015 415b47 SetEvent 54014->54015 54016 415b5c 54015->54016 54017 4041a2 28 API calls 54016->54017 54018 415b76 54017->54018 54019 4020f6 28 API calls 54018->54019 54020 415b86 54019->54020 54021 4020f6 28 API calls 54020->54021 54022 415b98 54021->54022 54023 41beac 28 API calls 54022->54023 54024 415ba1 54023->54024 54026 415bc1 GetTickCount 54024->54026 54027 415d20 54024->54027 54091 415d11 54024->54091 54025 401e8d 11 API calls 54029 4170cd 54025->54029 54028 41bc1f 28 API calls 54026->54028 54089 415d34 54027->54089 54027->54091 54030 415bd2 54028->54030 54032 401fd8 11 API calls 54029->54032 54092 41bb77 GetLastInputInfo GetTickCount 54030->54092 54034 4170d9 54032->54034 54036 401fd8 11 API calls 54034->54036 54035 415bde 54038 41bc1f 28 API calls 54035->54038 54037 4170e5 54036->54037 54039 415be9 54038->54039 54093 41bb27 54039->54093 54042 41bdaf 28 API calls 54043 415c05 54042->54043 54044 401e65 22 API calls 54043->54044 54045 415c13 54044->54045 54046 402f31 28 API calls 54045->54046 54047 415c21 54046->54047 54098 402ea1 28 API calls 54047->54098 54049 415c30 54050 402f10 28 API calls 54049->54050 54051 415c3f 54050->54051 54099 402ea1 28 API calls 54051->54099 54053 415c4e 54054 402f10 28 API calls 54053->54054 54055 415c5a 54054->54055 54100 402ea1 28 API calls 54055->54100 54057 415c64 54058 404aa1 61 API calls 54057->54058 54059 415c73 54058->54059 54060 401fd8 11 API calls 54059->54060 54061 415c7c 54060->54061 54062 401fd8 11 API calls 54061->54062 54063 415c88 54062->54063 54064 401fd8 11 API calls 54063->54064 54065 415c94 54064->54065 54066 401fd8 11 API calls 54065->54066 54067 415ca0 54066->54067 54068 401fd8 11 API calls 54067->54068 54069 415cac 54068->54069 54070 401fd8 11 API calls 54069->54070 54071 415cb8 54070->54071 54072 401f09 11 API calls 54071->54072 54073 415cc1 54072->54073 54074 401fd8 11 API calls 54073->54074 54075 415cca 54074->54075 54076 401fd8 11 API calls 54075->54076 54077 415cd3 54076->54077 54078 401e65 22 API calls 54077->54078 54079 415cde 54078->54079 54101 43bb2c 54079->54101 54082 415cf0 54085 415d09 54082->54085 54086 415cfe 54082->54086 54083 415d16 54084 401e65 22 API calls 54083->54084 54084->54027 54106 404f51 54085->54106 54105 404ff4 82 API calls 54086->54105 54121 4050e4 84 API calls 54089->54121 54090 415d04 54090->54091 54091->54025 54092->54035 54122 436f10 54093->54122 54096 40417e 28 API calls 54097 415bf7 54096->54097 54097->54042 54098->54049 54099->54053 54100->54057 54102 43bb45 _strftime 54101->54102 54124 43ae83 54102->54124 54104 415ceb 54104->54082 54104->54083 54105->54090 54107 404f65 54106->54107 54108 404fea 54106->54108 54109 404f6e 54107->54109 54110 404fc0 CreateEventA CreateThread 54107->54110 54111 404f7d GetLocalTime 54107->54111 54108->54091 54109->54110 54110->54108 54153 405150 54110->54153 54112 41bc1f 28 API calls 54111->54112 54113 404f91 54112->54113 54152 4052fd 28 API calls 54113->54152 54121->54090 54123 41bb46 GetForegroundWindow GetWindowTextW 54122->54123 54123->54096 54140 43ba8a 54124->54140 54126 43aed0 54146 43a837 36 API calls 2 library calls 54126->54146 54128 43ae95 54128->54126 54129 43aeaa 54128->54129 54139 43aeaf _strftime 54128->54139 54145 44062d 20 API calls __dosmaperr 54129->54145 54132 43aedc 54133 43af0b 54132->54133 54147 43bacf 40 API calls __Tolower 54132->54147 54136 43af77 54133->54136 54148 43ba36 20 API calls 2 library calls 54133->54148 54149 43ba36 20 API calls 2 library calls 54136->54149 54137 43b03e _strftime 54137->54139 54150 44062d 20 API calls __dosmaperr 54137->54150 54139->54104 54141 43baa2 54140->54141 54142 43ba8f 54140->54142 54141->54128 54151 44062d 20 API calls __dosmaperr 54142->54151 54144 43ba94 _strftime 54144->54128 54145->54139 54146->54132 54147->54132 54148->54136 54149->54137 54150->54139 54151->54144 54156 40515c 102 API calls 54153->54156 54155 405159 54156->54155 54157->53576 54158 43bea8 54160 43beb4 _swprintf CallCatchBlock 54158->54160 54159 43bec2 54174 44062d 20 API calls __dosmaperr 54159->54174 54160->54159 54162 43beec 54160->54162 54169 445909 EnterCriticalSection 54162->54169 54164 43bec7 _strftime CallCatchBlock 54165 43bef7 54170 43bf98 54165->54170 54169->54165 54171 43bfa6 54170->54171 54173 43bf02 54171->54173 54176 4497ec 37 API calls 2 library calls 54171->54176 54175 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 54173->54175 54174->54164 54175->54164 54176->54171 54177 434918 54178 434924 CallCatchBlock 54177->54178 54204 434627 54178->54204 54181 43492b 54182 434954 54181->54182 54502 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 54181->54502 54191 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54182->54191 54503 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 54182->54503 54184 43496d 54186 434973 CallCatchBlock 54184->54186 54504 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 54184->54504 54187 4349f3 54215 434ba5 54187->54215 54191->54187 54505 443487 36 API calls 6 library calls 54191->54505 54197 434a15 54198 434a1f 54197->54198 54507 4434bf 28 API calls _abort 54197->54507 54200 434a28 54198->54200 54508 443462 28 API calls _abort 54198->54508 54509 43479e 13 API calls 2 library calls 54200->54509 54203 434a30 54203->54186 54205 434630 54204->54205 54510 434cb6 IsProcessorFeaturePresent 54205->54510 54207 43463c 54511 438fb1 10 API calls 4 library calls 54207->54511 54209 434641 54210 434645 54209->54210 54512 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54209->54512 54210->54181 54212 43464e 54213 43465c 54212->54213 54513 438fda 8 API calls 3 library calls 54212->54513 54213->54181 54216 436f10 ___scrt_fastfail 54215->54216 54217 434bb8 GetStartupInfoW 54216->54217 54218 4349f9 54217->54218 54219 444223 54218->54219 54514 44f0d9 54219->54514 54221 44422c 54223 434a02 54221->54223 54518 446895 36 API calls 54221->54518 54224 40ea00 54223->54224 54520 41cbe1 LoadLibraryA GetProcAddress 54224->54520 54226 40ea1c GetModuleFileNameW 54525 40f3fe 54226->54525 54228 40ea38 54229 4020f6 28 API calls 54228->54229 54230 40ea47 54229->54230 54231 4020f6 28 API calls 54230->54231 54232 40ea56 54231->54232 54233 41beac 28 API calls 54232->54233 54234 40ea5f 54233->54234 54540 40fb52 54234->54540 54236 40ea68 54237 401e8d 11 API calls 54236->54237 54238 40ea71 54237->54238 54239 40ea84 54238->54239 54240 40eace 54238->54240 54734 40fbee 118 API calls 54239->54734 54241 401e65 22 API calls 54240->54241 54243 40eade 54241->54243 54247 401e65 22 API calls 54243->54247 54244 40ea96 54245 401e65 22 API calls 54244->54245 54246 40eaa2 54245->54246 54735 410f72 36 API calls __EH_prolog 54246->54735 54248 40eafd 54247->54248 54249 40531e 28 API calls 54248->54249 54251 40eb0c 54249->54251 54253 406383 28 API calls 54251->54253 54252 40eab4 54736 40fb9f 78 API calls 54252->54736 54255 40eb18 54253->54255 54257 401fe2 28 API calls 54255->54257 54256 40eabd 54737 40f3eb 71 API calls 54256->54737 54259 40eb24 54257->54259 54260 401fd8 11 API calls 54259->54260 54261 40eb2d 54260->54261 54263 401fd8 11 API calls 54261->54263 54262 401fd8 11 API calls 54264 40ef36 54262->54264 54265 40eb36 54263->54265 54506 443396 GetModuleHandleW 54264->54506 54266 401e65 22 API calls 54265->54266 54267 40eb3f 54266->54267 54268 401fc0 28 API calls 54267->54268 54269 40eb4a 54268->54269 54270 401e65 22 API calls 54269->54270 54271 40eb63 54270->54271 54272 401e65 22 API calls 54271->54272 54273 40eb7e 54272->54273 54274 40ebe9 54273->54274 54738 406c59 54273->54738 54275 401e65 22 API calls 54274->54275 54280 40ebf6 54275->54280 54277 40ebab 54278 401fe2 28 API calls 54277->54278 54279 40ebb7 54278->54279 54282 401fd8 11 API calls 54279->54282 54281 40ec3d 54280->54281 54287 413584 3 API calls 54280->54287 54544 40d0a4 54281->54544 54284 40ebc0 54282->54284 54743 413584 RegOpenKeyExA 54284->54743 54285 40ec43 54286 40eac6 54285->54286 54547 41b354 54285->54547 54286->54262 54293 40ec21 54287->54293 54291 40f38a 54836 4139e4 30 API calls 54291->54836 54292 40ec5e 54294 40ecb1 54292->54294 54564 407751 54292->54564 54293->54281 54746 4139e4 30 API calls 54293->54746 54296 401e65 22 API calls 54294->54296 54299 40ecba 54296->54299 54308 40ecc6 54299->54308 54309 40eccb 54299->54309 54301 40f3a0 54837 4124b0 65 API calls ___scrt_fastfail 54301->54837 54302 40ec87 54306 401e65 22 API calls 54302->54306 54303 40ec7d 54747 407773 30 API calls 54303->54747 54318 40ec90 54306->54318 54307 40f3aa 54311 41bcef 28 API calls 54307->54311 54750 407790 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 54308->54750 54314 401e65 22 API calls 54309->54314 54310 40ec82 54748 40729b 98 API calls 54310->54748 54315 40f3ba 54311->54315 54316 40ecd4 54314->54316 54636 413a5e RegOpenKeyExW 54315->54636 54568 41bcef 54316->54568 54318->54294 54322 40ecac 54318->54322 54319 40ecdf 54572 401f13 54319->54572 54749 40729b 98 API calls 54322->54749 54324 401f09 11 API calls 54327 40f3d7 54324->54327 54329 401f09 11 API calls 54327->54329 54328 401f09 11 API calls 54330 40ecf3 54328->54330 54332 40f3e0 54329->54332 54331 401e65 22 API calls 54330->54331 54333 40ecfc 54331->54333 54639 40dd7d 54332->54639 54337 401e65 22 API calls 54333->54337 54339 40ed16 54337->54339 54338 40f3ea 54340 401e65 22 API calls 54339->54340 54341 40ed30 54340->54341 54342 401e65 22 API calls 54341->54342 54343 40ed49 54342->54343 54344 40edb6 54343->54344 54345 401e65 22 API calls 54343->54345 54346 40edc5 54344->54346 54351 40ef41 ___scrt_fastfail 54344->54351 54350 40ed5e _wcslen 54345->54350 54347 40edce 54346->54347 54375 40ee4a ___scrt_fastfail 54346->54375 54348 401e65 22 API calls 54347->54348 54349 40edd7 54348->54349 54352 401e65 22 API calls 54349->54352 54350->54344 54353 401e65 22 API calls 54350->54353 54811 413733 RegOpenKeyExA 54351->54811 54354 40ede9 54352->54354 54355 40ed79 54353->54355 54357 401e65 22 API calls 54354->54357 54359 401e65 22 API calls 54355->54359 54358 40edfb 54357->54358 54362 401e65 22 API calls 54358->54362 54360 40ed8e 54359->54360 54751 40da6f 54360->54751 54361 40ef8c 54363 401e65 22 API calls 54361->54363 54365 40ee24 54362->54365 54366 40efb1 54363->54366 54370 401e65 22 API calls 54365->54370 54371 402093 28 API calls 54366->54371 54368 401f13 28 API calls 54369 40edad 54368->54369 54372 401f09 11 API calls 54369->54372 54373 40ee35 54370->54373 54374 40efc3 54371->54374 54372->54344 54809 40ce34 46 API calls _wcslen 54373->54809 54591 4137aa RegCreateKeyA 54374->54591 54581 413982 54375->54581 54380 40eede ctype 54384 401e65 22 API calls 54380->54384 54381 40ee45 54381->54375 54382 401e65 22 API calls 54383 40efe5 54382->54383 54386 43bb2c _strftime 40 API calls 54383->54386 54385 40eef5 54384->54385 54385->54361 54389 40ef09 54385->54389 54387 40eff2 54386->54387 54388 40effc 54387->54388 54391 40f01f 54387->54391 54814 41ce2c 88 API calls ___scrt_fastfail 54388->54814 54390 401e65 22 API calls 54389->54390 54392 40ef12 54390->54392 54394 402093 28 API calls 54391->54394 54395 41bcef 28 API calls 54392->54395 54397 40f034 54394->54397 54398 40ef1e 54395->54398 54396 40f003 CreateThread 54396->54391 55151 41d4ee 10 API calls 54396->55151 54399 402093 28 API calls 54397->54399 54810 40f4af 114 API calls 54398->54810 54401 40f043 54399->54401 54403 41b580 80 API calls 54401->54403 54402 40ef23 54402->54361 54404 40ef2a 54402->54404 54405 40f048 54403->54405 54404->54286 54406 401e65 22 API calls 54405->54406 54407 40f054 54406->54407 54408 401e65 22 API calls 54407->54408 54409 40f066 54408->54409 54410 401e65 22 API calls 54409->54410 54411 40f086 54410->54411 54412 43bb2c _strftime 40 API calls 54411->54412 54413 40f093 54412->54413 54414 401e65 22 API calls 54413->54414 54415 40f09e 54414->54415 54416 401e65 22 API calls 54415->54416 54417 40f0af 54416->54417 54418 401e65 22 API calls 54417->54418 54419 40f0c4 54418->54419 54420 401e65 22 API calls 54419->54420 54421 40f0d5 54420->54421 54422 40f0dc StrToIntA 54421->54422 54597 409e1f 54422->54597 54425 401e65 22 API calls 54426 40f0f7 54425->54426 54427 40f103 54426->54427 54428 40f13c 54426->54428 54815 43455e 54427->54815 54430 401e65 22 API calls 54428->54430 54432 40f14c 54430->54432 54436 40f194 54432->54436 54437 40f158 54432->54437 54433 401e65 22 API calls 54434 40f11f 54433->54434 54435 40f126 CreateThread 54434->54435 54435->54428 55148 41a045 113 API calls 2 library calls 54435->55148 54438 401e65 22 API calls 54436->54438 54439 43455e new 22 API calls 54437->54439 54440 40f19d 54438->54440 54441 40f161 54439->54441 54444 40f207 54440->54444 54445 40f1a9 54440->54445 54442 401e65 22 API calls 54441->54442 54443 40f173 54442->54443 54448 40f17a CreateThread 54443->54448 54446 401e65 22 API calls 54444->54446 54447 401e65 22 API calls 54445->54447 54449 40f210 54446->54449 54450 40f1b9 54447->54450 54448->54436 55147 41a045 113 API calls 2 library calls 54448->55147 54451 40f255 54449->54451 54452 40f21c 54449->54452 54453 401e65 22 API calls 54450->54453 54622 41b69e GetComputerNameExW GetUserNameW 54451->54622 54455 401e65 22 API calls 54452->54455 54456 40f1ce 54453->54456 54458 40f225 54455->54458 54822 40da23 54456->54822 54463 401e65 22 API calls 54458->54463 54459 401f13 28 API calls 54460 40f269 54459->54460 54462 401f09 11 API calls 54460->54462 54465 40f272 54462->54465 54466 40f23a 54463->54466 54469 40f27b SetProcessDEPPolicy 54465->54469 54470 40f27e CreateThread 54465->54470 54474 43bb2c _strftime 40 API calls 54466->54474 54467 401f13 28 API calls 54468 40f1ed 54467->54468 54471 401f09 11 API calls 54468->54471 54469->54470 54472 40f293 CreateThread 54470->54472 54473 40f29f 54470->54473 55120 40f7e2 54470->55120 54475 40f1f6 CreateThread 54471->54475 54472->54473 55149 412132 146 API calls 54472->55149 54476 40f2b4 54473->54476 54477 40f2a8 CreateThread 54473->54477 54478 40f247 54474->54478 54475->54444 55150 401be9 50 API calls _strftime 54475->55150 54479 40f307 54476->54479 54481 402093 28 API calls 54476->54481 54477->54476 55152 412716 38 API calls ___scrt_fastfail 54477->55152 54833 40c19d 7 API calls 54478->54833 54633 41353a RegOpenKeyExA 54479->54633 54482 40f2d7 54481->54482 54834 4052fd 28 API calls 54482->54834 54487 40f328 54489 41bcef 28 API calls 54487->54489 54491 40f338 54489->54491 54835 413656 31 API calls 54491->54835 54496 40f34e 54497 401f09 11 API calls 54496->54497 54500 40f359 54497->54500 54498 40f381 DeleteFileW 54499 40f388 54498->54499 54498->54500 54499->54307 54500->54307 54500->54498 54501 40f36f Sleep 54500->54501 54501->54500 54502->54181 54503->54184 54504->54191 54505->54187 54506->54197 54507->54198 54508->54200 54509->54203 54510->54207 54511->54209 54512->54212 54513->54210 54515 44f0eb 54514->54515 54516 44f0e2 54514->54516 54515->54221 54519 44efd8 49 API calls 5 library calls 54516->54519 54518->54221 54519->54515 54521 41cc20 LoadLibraryA GetProcAddress 54520->54521 54522 41cc10 GetModuleHandleA GetProcAddress 54520->54522 54523 41cc49 44 API calls 54521->54523 54524 41cc39 LoadLibraryA GetProcAddress 54521->54524 54522->54521 54523->54226 54524->54523 54838 41b539 FindResourceA 54525->54838 54528 43bda0 _Yarn 21 API calls 54529 40f428 _Yarn 54528->54529 54530 4020b7 28 API calls 54529->54530 54531 40f443 54530->54531 54532 401fe2 28 API calls 54531->54532 54533 40f44e 54532->54533 54534 401fd8 11 API calls 54533->54534 54535 40f457 54534->54535 54536 43bda0 _Yarn 21 API calls 54535->54536 54537 40f468 _Yarn 54536->54537 54841 406e13 54537->54841 54539 40f49b 54539->54228 54541 40fb5e 54540->54541 54543 40fb65 54540->54543 54844 402163 11 API calls 54541->54844 54543->54236 54845 401fab 54544->54845 54546 40d0ae CreateMutexA GetLastError 54546->54285 54846 41c048 54547->54846 54552 401fe2 28 API calls 54553 41b390 54552->54553 54554 401fd8 11 API calls 54553->54554 54555 41b398 54554->54555 54556 4135e1 31 API calls 54555->54556 54558 41b3ee 54555->54558 54557 41b3c1 54556->54557 54559 41b3cc StrToIntA 54557->54559 54558->54292 54560 41b3e3 54559->54560 54561 41b3da 54559->54561 54562 401fd8 11 API calls 54560->54562 54855 41cffa 22 API calls 54561->54855 54562->54558 54565 407765 54564->54565 54566 413584 3 API calls 54565->54566 54567 40776c 54566->54567 54567->54302 54567->54303 54569 41bd03 54568->54569 54570 40b93f 28 API calls 54569->54570 54571 41bd0b 54570->54571 54571->54319 54573 401f22 54572->54573 54580 401f6a 54572->54580 54574 402252 11 API calls 54573->54574 54575 401f2b 54574->54575 54576 401f46 54575->54576 54577 401f6d 54575->54577 54856 40305c 28 API calls 54576->54856 54857 402336 54577->54857 54580->54328 54582 4139a0 54581->54582 54583 406e13 28 API calls 54582->54583 54584 4139b5 54583->54584 54585 4020f6 28 API calls 54584->54585 54586 4139c5 54585->54586 54587 4137aa 14 API calls 54586->54587 54588 4139cf 54587->54588 54589 401fd8 11 API calls 54588->54589 54590 4139dc 54589->54590 54590->54380 54592 4137fa 54591->54592 54595 4137c3 54591->54595 54593 401fd8 11 API calls 54592->54593 54594 40efd9 54593->54594 54594->54382 54596 4137d5 RegSetValueExA RegCloseKey 54595->54596 54596->54592 54598 409e3d _wcslen 54597->54598 54599 409e48 54598->54599 54600 409e5f 54598->54600 54602 40da6f 32 API calls 54599->54602 54601 40da6f 32 API calls 54600->54601 54604 409e67 54601->54604 54603 409e50 54602->54603 54605 401f13 28 API calls 54603->54605 54606 401f13 28 API calls 54604->54606 54607 409e5a 54605->54607 54608 409e75 54606->54608 54610 401f09 11 API calls 54607->54610 54609 401f09 11 API calls 54608->54609 54611 409e7d 54609->54611 54612 409eb4 54610->54612 54876 409196 28 API calls 54611->54876 54861 40a144 54612->54861 54615 409e8f 54877 403014 54615->54877 54619 401f13 28 API calls 54620 409ea4 54619->54620 54621 401f09 11 API calls 54620->54621 54621->54607 54623 40417e 28 API calls 54622->54623 54624 41b6ed 54623->54624 54926 4042fc 54624->54926 54627 403014 28 API calls 54628 41b703 54627->54628 54629 401f09 11 API calls 54628->54629 54630 41b70c 54629->54630 54631 401f09 11 API calls 54630->54631 54632 40f25e 54631->54632 54632->54459 54634 41355b RegQueryValueExA RegCloseKey 54633->54634 54635 40f31f 54633->54635 54634->54635 54635->54332 54635->54487 54637 40f3cd 54636->54637 54638 413a7a RegDeleteValueW 54636->54638 54637->54324 54638->54637 54640 40dd96 54639->54640 54641 41353a 3 API calls 54640->54641 54642 40dd9d 54641->54642 54643 40ddbc 54642->54643 55001 401707 54642->55001 54647 414f65 54643->54647 54645 40ddaa 55004 4138b2 RegCreateKeyA 54645->55004 54648 4020df 11 API calls 54647->54648 54649 414f79 54648->54649 55018 41b944 54649->55018 54652 4020df 11 API calls 54653 414f8f 54652->54653 54654 401e65 22 API calls 54653->54654 54655 414f9d 54654->54655 54656 43bb2c _strftime 40 API calls 54655->54656 54657 414faa 54656->54657 54658 414fbc 54657->54658 54659 414faf Sleep 54657->54659 54660 402093 28 API calls 54658->54660 54659->54658 54661 414fcb 54660->54661 54662 401e65 22 API calls 54661->54662 54663 414fd4 54662->54663 54664 4020f6 28 API calls 54663->54664 54665 414fdf 54664->54665 54666 41beac 28 API calls 54665->54666 54667 414fe7 54666->54667 55022 40489e WSAStartup 54667->55022 54669 414ff1 54670 401e65 22 API calls 54669->54670 54671 414ffa 54670->54671 54672 401e65 22 API calls 54671->54672 54697 415079 54671->54697 54673 415013 54672->54673 54674 401e65 22 API calls 54673->54674 54675 415024 54674->54675 54677 401e65 22 API calls 54675->54677 54676 41beac 28 API calls 54676->54697 54678 415035 54677->54678 54680 401e65 22 API calls 54678->54680 54679 406c59 28 API calls 54679->54697 54681 415046 54680->54681 54684 401e65 22 API calls 54681->54684 54682 402f10 28 API calls 54682->54697 54683 401fe2 28 API calls 54683->54697 54685 415057 54684->54685 54686 401e65 22 API calls 54685->54686 54687 415069 54686->54687 55048 40473d 89 API calls 54687->55048 54689 41b580 80 API calls 54689->54697 54691 4151c7 WSAGetLastError 55049 41cb72 30 API calls 54691->55049 54692 40482d 3 API calls 54692->54697 54695 404f51 105 API calls 54695->54697 54696 402093 28 API calls 54696->54697 54697->54676 54697->54679 54697->54682 54697->54683 54697->54689 54697->54691 54697->54692 54697->54695 54697->54696 54698 4048c8 97 API calls 54697->54698 54699 401e65 22 API calls 54697->54699 54700 404e26 99 API calls 54697->54700 54701 40531e 28 API calls 54697->54701 54703 401e8d 11 API calls 54697->54703 54704 415a6e 54697->54704 54709 409097 28 API calls 54697->54709 54710 441ed1 20 API calls 54697->54710 54711 4020f6 28 API calls 54697->54711 54712 413733 3 API calls 54697->54712 54713 4135e1 31 API calls 54697->54713 54714 40417e 28 API calls 54697->54714 54717 401e65 22 API calls 54697->54717 54721 41bc1f 28 API calls 54697->54721 54722 41bb27 30 API calls 54697->54722 54723 41bdaf 28 API calls 54697->54723 54725 402f31 28 API calls 54697->54725 54726 402ea1 28 API calls 54697->54726 54727 406383 28 API calls 54697->54727 54728 404aa1 61 API calls 54697->54728 54729 401fd8 11 API calls 54697->54729 54730 404c10 265 API calls 54697->54730 54732 415aac CreateThread 54697->54732 54733 401f09 11 API calls 54697->54733 55023 414f24 54697->55023 55029 41b871 54697->55029 55032 4145f8 54697->55032 55035 40ddc4 54697->55035 55041 41bcd3 54697->55041 55044 41bb77 GetLastInputInfo GetTickCount 54697->55044 55045 40f90c GetLocaleInfoA 54697->55045 55050 4052fd 28 API calls 54697->55050 54698->54697 54699->54697 54700->54697 54701->54697 54702 401e65 22 API calls 54702->54704 54703->54697 54704->54702 54705 43bb2c _strftime 40 API calls 54704->54705 55051 40b08c 85 API calls 54704->55051 54706 415b0a Sleep 54705->54706 54706->54697 54709->54697 54710->54697 54711->54697 54712->54697 54713->54697 54714->54697 54718 415474 GetTickCount 54717->54718 54719 41bc1f 28 API calls 54718->54719 54719->54697 54721->54697 54722->54697 54723->54697 54725->54697 54726->54697 54727->54697 54728->54697 54729->54697 54730->54697 54732->54697 55092 41ada8 106 API calls 54732->55092 54733->54697 54734->54244 54735->54252 54736->54256 54739 4020df 11 API calls 54738->54739 54740 406c65 54739->54740 54741 4032a0 28 API calls 54740->54741 54742 406c82 54741->54742 54742->54277 54744 40ebdf 54743->54744 54745 4135ae RegQueryValueExA RegCloseKey 54743->54745 54744->54274 54744->54291 54745->54744 54746->54281 54747->54310 54748->54302 54749->54294 54750->54309 55093 401f86 54751->55093 54754 40dae0 54759 41c048 2 API calls 54754->54759 54755 40daab 55112 41b645 29 API calls 54755->55112 54756 40daa1 54758 40dbd4 GetLongPathNameW 54756->54758 54762 40417e 28 API calls 54758->54762 54760 40dae5 54759->54760 54763 40dae9 54760->54763 54764 40db3b 54760->54764 54761 40dab4 54765 401f13 28 API calls 54761->54765 54766 40dbe9 54762->54766 54768 40417e 28 API calls 54763->54768 54767 40417e 28 API calls 54764->54767 54769 40dabe 54765->54769 54770 40417e 28 API calls 54766->54770 54772 40db49 54767->54772 54773 40daf7 54768->54773 54775 401f09 11 API calls 54769->54775 54771 40dbf8 54770->54771 55097 40de0c 54771->55097 54778 40417e 28 API calls 54772->54778 54779 40417e 28 API calls 54773->54779 54775->54756 54781 40db5f 54778->54781 54782 40db0d 54779->54782 54784 402fa5 28 API calls 54781->54784 54785 402fa5 28 API calls 54782->54785 54783 402fa5 28 API calls 54786 40dc20 54783->54786 54787 40db6a 54784->54787 54788 40db18 54785->54788 54789 401f09 11 API calls 54786->54789 54790 401f13 28 API calls 54787->54790 54791 401f13 28 API calls 54788->54791 54792 40dc2a 54789->54792 54793 40db75 54790->54793 54794 40db23 54791->54794 54795 401f09 11 API calls 54792->54795 54796 401f09 11 API calls 54793->54796 54797 401f09 11 API calls 54794->54797 54798 40dc33 54795->54798 54799 40db7e 54796->54799 54800 40db2c 54797->54800 54801 401f09 11 API calls 54798->54801 54802 401f09 11 API calls 54799->54802 54803 401f09 11 API calls 54800->54803 54804 40dc3c 54801->54804 54802->54769 54803->54769 54805 401f09 11 API calls 54804->54805 54806 40dc45 54805->54806 54807 401f09 11 API calls 54806->54807 54808 40dc4e 54807->54808 54808->54368 54809->54381 54810->54402 54812 413759 RegQueryValueExA RegCloseKey 54811->54812 54813 41377d 54811->54813 54812->54813 54813->54361 54814->54396 54817 434563 54815->54817 54816 43bda0 _Yarn 21 API calls 54816->54817 54817->54816 54818 40f10c 54817->54818 55117 443001 7 API calls 2 library calls 54817->55117 55118 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54817->55118 55119 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54817->55119 54818->54433 54823 402093 28 API calls 54822->54823 54824 40da3a 54823->54824 54825 41bcef 28 API calls 54824->54825 54826 40da45 54825->54826 54827 40da6f 32 API calls 54826->54827 54828 40da56 54827->54828 54829 401f09 11 API calls 54828->54829 54830 40da5f 54829->54830 54831 401fd8 11 API calls 54830->54831 54832 40da67 54831->54832 54832->54467 54833->54451 54835->54496 54836->54301 54839 41b556 LoadResource LockResource SizeofResource 54838->54839 54840 40f419 54838->54840 54839->54840 54840->54528 54842 4020b7 28 API calls 54841->54842 54843 406e27 54842->54843 54843->54539 54844->54543 54847 41b362 54846->54847 54848 41c055 GetCurrentProcess IsWow64Process 54846->54848 54850 4135e1 RegOpenKeyExA 54847->54850 54848->54847 54849 41c06c 54848->54849 54849->54847 54851 413639 54850->54851 54852 41360f RegQueryValueExA RegCloseKey 54850->54852 54853 402093 28 API calls 54851->54853 54852->54851 54854 41364e 54853->54854 54854->54552 54855->54560 54856->54580 54858 402347 54857->54858 54859 402252 11 API calls 54858->54859 54860 4023c7 54859->54860 54860->54580 54862 40a162 54861->54862 54863 413584 3 API calls 54862->54863 54864 40a169 54863->54864 54865 40a197 54864->54865 54866 40a17d 54864->54866 54869 409097 28 API calls 54865->54869 54867 40a182 54866->54867 54868 409ed6 54866->54868 54882 409097 54867->54882 54868->54425 54871 40a1a5 54869->54871 54889 40a1b4 86 API calls 54871->54889 54875 40a195 54875->54868 54876->54615 54894 403222 54877->54894 54879 403022 54898 403262 54879->54898 54883 4090ad 54882->54883 54884 402252 11 API calls 54883->54884 54885 4090c7 54884->54885 54886 404267 28 API calls 54885->54886 54887 4090d5 54886->54887 54888 40a268 29 API calls 54887->54888 54888->54875 54890 40a2ae 164 API calls 54888->54890 54889->54868 54891 40a2a2 86 API calls 54889->54891 54892 40a2c4 49 API calls 54889->54892 54893 40a2b8 129 API calls 54889->54893 54895 40322e 54894->54895 54904 403618 54895->54904 54897 40323b 54897->54879 54899 40326e 54898->54899 54900 402252 11 API calls 54899->54900 54901 403288 54900->54901 54902 402336 11 API calls 54901->54902 54903 403031 54902->54903 54903->54619 54905 403626 54904->54905 54906 403644 54905->54906 54907 40362c 54905->54907 54909 40365c 54906->54909 54910 40369e 54906->54910 54915 4036a6 54907->54915 54913 4027e6 28 API calls 54909->54913 54914 403642 54909->54914 54924 4028a4 22 API calls 54910->54924 54913->54914 54914->54897 54916 402888 22 API calls 54915->54916 54917 4036b9 54916->54917 54918 40372c 54917->54918 54919 4036de 54917->54919 54925 4028a4 22 API calls 54918->54925 54922 4027e6 28 API calls 54919->54922 54923 4036f0 54919->54923 54922->54923 54923->54914 54931 404353 54926->54931 54928 40430a 54929 403262 11 API calls 54928->54929 54930 404319 54929->54930 54930->54627 54932 40435f 54931->54932 54935 404371 54932->54935 54934 40436d 54934->54928 54936 40437f 54935->54936 54937 404385 54936->54937 54938 40439e 54936->54938 54999 4034e6 28 API calls 54937->54999 54939 402888 22 API calls 54938->54939 54940 4043a6 54939->54940 54942 404419 54940->54942 54943 4043bf 54940->54943 55000 4028a4 22 API calls 54942->55000 54945 4027e6 28 API calls 54943->54945 54953 40439c 54943->54953 54945->54953 54953->54934 54999->54953 55007 43ab1a 55001->55007 55005 4138ca RegSetValueExA RegCloseKey 55004->55005 55006 4138f4 55004->55006 55005->55006 55006->54643 55010 43aa9b 55007->55010 55009 40170d 55009->54645 55011 43aaaa 55010->55011 55012 43aabe 55010->55012 55016 44062d 20 API calls __dosmaperr 55011->55016 55015 43aaaf __alldvrm _strftime 55012->55015 55017 4489d7 11 API calls 2 library calls 55012->55017 55015->55009 55016->55015 55017->55015 55020 41b98a _Yarn ___scrt_fastfail 55018->55020 55019 402093 28 API calls 55021 414f84 55019->55021 55020->55019 55021->54652 55022->54669 55024 414f33 55023->55024 55025 414f3d WSASetLastError 55023->55025 55052 414dc1 29 API calls ___std_exception_copy 55024->55052 55025->54697 55027 414f38 55027->55025 55053 41b847 GlobalMemoryStatusEx 55029->55053 55031 41b886 55031->54697 55054 4145bb 55032->55054 55036 40dde0 55035->55036 55037 41353a 3 API calls 55036->55037 55039 40dde7 55037->55039 55038 40ddff 55038->54697 55039->55038 55040 413584 3 API calls 55039->55040 55040->55038 55042 4020b7 28 API calls 55041->55042 55043 41bce8 55042->55043 55043->54697 55044->54697 55046 402093 28 API calls 55045->55046 55047 40f931 55046->55047 55047->54697 55048->54697 55049->54697 55051->54697 55052->55027 55053->55031 55057 41458e 55054->55057 55058 4145a3 ___scrt_initialize_default_local_stdio_options 55057->55058 55061 43f7ed 55058->55061 55064 43c540 55061->55064 55065 43c580 55064->55065 55066 43c568 55064->55066 55065->55066 55068 43c588 55065->55068 55086 44062d 20 API calls __dosmaperr 55066->55086 55087 43a837 36 API calls 2 library calls 55068->55087 55070 43c598 55088 43ccc6 20 API calls 2 library calls 55070->55088 55071 43c56d _strftime 55079 43502b 55071->55079 55074 4145b1 55074->54697 55075 43c610 55089 43d334 51 API calls 3 library calls 55075->55089 55078 43c61b 55090 43cd30 20 API calls _free 55078->55090 55080 435036 IsProcessorFeaturePresent 55079->55080 55081 435034 55079->55081 55083 435078 55080->55083 55081->55074 55091 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 55083->55091 55085 43515b 55085->55074 55086->55071 55087->55070 55088->55075 55089->55078 55090->55071 55091->55085 55094 401f8e 55093->55094 55095 402252 11 API calls 55094->55095 55096 401f99 55095->55096 55096->54754 55096->54755 55096->54756 55098 40de14 55097->55098 55099 402252 11 API calls 55098->55099 55100 40de1f 55099->55100 55101 4041d9 28 API calls 55100->55101 55102 40dc0b 55101->55102 55103 402fa5 55102->55103 55109 402fb4 55103->55109 55104 402ff6 55114 40323f 55104->55114 55106 402ff4 55107 403262 11 API calls 55106->55107 55108 40300d 55107->55108 55108->54783 55109->55104 55110 402feb 55109->55110 55113 403211 28 API calls 55110->55113 55112->54761 55113->55106 55115 4036a6 28 API calls 55114->55115 55116 40324c 55115->55116 55116->55106 55117->54817 55122 40f7fd 55120->55122 55121 413584 3 API calls 55121->55122 55122->55121 55124 40f8a1 55122->55124 55126 40f891 Sleep 55122->55126 55139 40f82f 55122->55139 55123 409097 28 API calls 55123->55139 55125 409097 28 API calls 55124->55125 55128 40f8ac 55125->55128 55126->55122 55127 41bcef 28 API calls 55127->55139 55130 41bcef 28 API calls 55128->55130 55131 40f8b8 55130->55131 55155 41384f 14 API calls 55131->55155 55134 401f09 11 API calls 55134->55139 55135 40f8cb 55136 401f09 11 API calls 55135->55136 55138 40f8d7 55136->55138 55137 402093 28 API calls 55137->55139 55140 402093 28 API calls 55138->55140 55139->55123 55139->55126 55139->55127 55139->55134 55139->55137 55142 4137aa 14 API calls 55139->55142 55153 40d0d1 112 API calls ___scrt_fastfail 55139->55153 55154 41384f 14 API calls 55139->55154 55141 40f8e8 55140->55141 55143 4137aa 14 API calls 55141->55143 55142->55139 55144 40f8fb 55143->55144 55156 41288b TerminateProcess WaitForSingleObject 55144->55156 55146 40f903 ExitProcess 55157 412829 62 API calls 55149->55157 55154->55139 55155->55135 55156->55146 55158 42f97e 55159 42f989 55158->55159 55160 42f99d 55159->55160 55162 432f7f 55159->55162 55163 432f8e 55162->55163 55165 432f8a 55162->55165 55166 440f5d 55163->55166 55165->55160 55167 446206 55166->55167 55168 446213 55167->55168 55169 44621e 55167->55169 55185 4461b8 21 API calls 3 library calls 55168->55185 55171 446226 55169->55171 55177 44622f __Getctype 55169->55177 55179 446802 55171->55179 55173 446234 55186 44062d 20 API calls __dosmaperr 55173->55186 55174 446259 RtlReAllocateHeap 55175 44621b 55174->55175 55174->55177 55175->55165 55177->55173 55177->55174 55187 443001 7 API calls 2 library calls 55177->55187 55180 44680d RtlFreeHeap 55179->55180 55181 446836 __dosmaperr 55179->55181 55180->55181 55182 446822 55180->55182 55181->55175 55188 44062d 20 API calls __dosmaperr 55182->55188 55184 446828 GetLastError 55184->55181 55185->55175 55186->55175 55187->55177 55188->55184 55189 40165e 55190 401666 55189->55190 55191 401669 55189->55191 55192 4016a8 55191->55192 55194 401696 55191->55194 55193 43455e new 22 API calls 55192->55193 55195 40169c 55193->55195 55196 43455e new 22 API calls 55194->55196 55196->55195 55197 426cdc 55202 426d59 send 55197->55202 55203 41e04e 55204 41e063 _Yarn ___scrt_fastfail 55203->55204 55205 41e266 55204->55205 55206 432f55 21 API calls 55204->55206 55211 41e21a 55205->55211 55217 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 55205->55217 55210 41e213 ___scrt_fastfail 55206->55210 55208 41e277 55209 432f55 21 API calls 55208->55209 55208->55211 55213 41e2b0 ___scrt_fastfail 55209->55213 55210->55211 55212 432f55 21 API calls 55210->55212 55215 41e240 ___scrt_fastfail 55212->55215 55213->55211 55218 4335db 55213->55218 55215->55211 55216 432f55 21 API calls 55215->55216 55216->55205 55217->55208 55221 4334fa 55218->55221 55220 4335e3 55220->55211 55222 433513 55221->55222 55225 433509 55221->55225 55223 432f55 21 API calls 55222->55223 55222->55225 55224 433534 55223->55224 55224->55225 55227 4338c8 CryptAcquireContextA 55224->55227 55225->55220 55228 4338e9 CryptGenRandom 55227->55228 55229 4338e4 55227->55229 55228->55229 55230 4338fe CryptReleaseContext 55228->55230 55229->55225 55230->55229 55231 426c6d 55237 426d42 recv 55231->55237

                  Control-flow Graph

                  APIs
                  • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                  • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                  • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$LibraryLoad$HandleModule
                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                  • API String ID: 4236061018-3687161714
                  • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                  • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                  • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                  • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 5 41812a-418153 6 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5->6 7 4181c4-4181cb 6->7 8 4184bb 6->8 7->8 10 4181d1-4181d8 7->10 9 4184bd-4184c7 8->9 10->8 11 4181de-4181e0 10->11 11->8 12 4181e6-418213 call 436f10 * 2 11->12 12->8 17 418219-418224 12->17 17->8 18 41822a-41825a CreateProcessW 17->18 19 418260-418288 VirtualAlloc Wow64GetThreadContext 18->19 20 4184b5 GetLastError 18->20 21 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 19->21 22 41828e-4182ae ReadProcessMemory 19->22 20->8 21->8 22->21 23 4182b4-4182d6 NtCreateSection 22->23 23->21 24 4182dc-4182e9 23->24 25 4182eb-4182f6 NtUnmapViewOfSection 24->25 26 4182fc-41831e NtMapViewOfSection 24->26 25->26 27 418320-41835d VirtualFree NtClose TerminateProcess 26->27 28 418368-41838f GetCurrentProcess NtMapViewOfSection 26->28 27->6 29 418363 27->29 28->21 30 418395-418399 28->30 29->8 31 4183a2-4183c0 call 436990 30->31 32 41839b-41839f 30->32 35 418402-41840b 31->35 36 4183c2-4183d0 31->36 32->31 37 41842b-41842f 35->37 38 41840d-418413 35->38 39 4183d2-4183f5 call 436990 36->39 41 418431-41844e WriteProcessMemory 37->41 42 418454-41846b Wow64SetThreadContext 37->42 38->37 40 418415-418428 call 41853e 38->40 48 4183f7-4183fe 39->48 40->37 41->21 46 418450 41->46 42->21 47 41846d-418479 ResumeThread 42->47 46->42 47->21 50 41847b-41847d 47->50 48->35 50->9
                  APIs
                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                  • GetProcAddress.KERNEL32(00000000), ref: 00418174
                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                  • GetProcAddress.KERNEL32(00000000), ref: 00418188
                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                  • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                  • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0041826A
                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,?), ref: 004182A6
                  • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                  • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00418328
                  • NtClose.NTDLL(?), ref: 00418332
                  • TerminateProcess.KERNELBASE(?,00000000), ref: 0041833C
                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                  • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                  • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00418446
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                  • ResumeThread.KERNELBASE(?), ref: 00418470
                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                  • GetCurrentProcess.KERNEL32(?), ref: 00418492
                  • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                  • NtClose.NTDLL(?), ref: 004184A3
                  • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                  • GetLastError.KERNEL32 ref: 004184B5
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                  • API String ID: 3150337530-3035715614
                  • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                  • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                  • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                  • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1460 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1467 10001177-1000119e lstrlenW FindFirstFileW 1460->1467 1468 10001168-10001172 lstrlenW 1460->1468 1469 100011a0-100011a8 1467->1469 1470 100011e1-100011e9 1467->1470 1468->1467 1471 100011c7-100011d8 FindNextFileW 1469->1471 1472 100011aa-100011c4 call 10001000 1469->1472 1471->1469 1474 100011da-100011db FindClose 1471->1474 1472->1471 1474->1470
                  APIs
                  • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                  • lstrcatW.KERNEL32(?,?), ref: 10001151
                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                  • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                  • FindClose.KERNELBASE(00000000), ref: 100011DB
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                  • String ID:
                  • API String ID: 1083526818-0
                  • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                  • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                  • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                  • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1476 41b411-41b454 call 4020df call 43bda0 InternetOpenW InternetOpenUrlW 1481 41b456-41b477 InternetReadFile 1476->1481 1482 41b479-41b499 call 4020b7 call 403376 call 401fd8 1481->1482 1483 41b49d-41b4a0 1481->1483 1482->1483 1484 41b4a2-41b4a4 1483->1484 1485 41b4a6-41b4b3 InternetCloseHandle * 2 call 43bd9b 1483->1485 1484->1481 1484->1485 1489 41b4b8-41b4c2 1485->1489
                  APIs
                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                  • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                  • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                  Strings
                  • http://geoplugin.net/json.gp, xrefs: 0041B448
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Internet$CloseHandleOpen$FileRead
                  • String ID: http://geoplugin.net/json.gp
                  • API String ID: 3121278467-91888290
                  • Opcode ID: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                  • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                  • Opcode Fuzzy Hash: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                  • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1521 411d39-411d59 call 4117d7 1524 411d62-411d6b 1521->1524 1525 411d5b-411d5d 1521->1525 1527 411d7a-411d8c call 4117d7 1524->1527 1528 411d6d-411d78 SetLastError 1524->1528 1526 411f75-411f7b 1525->1526 1527->1525 1531 411d8e-411d99 1527->1531 1528->1525 1531->1528 1532 411d9b-411da4 1531->1532 1532->1528 1533 411da6-411daa 1532->1533 1533->1528 1534 411dac-411db6 1533->1534 1535 411db8-411dbb 1534->1535 1536 411dda-411dfd GetNativeSystemInfo call 4117c6 * 2 1534->1536 1537 411dbd-411dc3 1535->1537 1545 411e0f-411e29 call 411cde 1536->1545 1546 411dff 1536->1546 1539 411dc5-411dc8 1537->1539 1540 411dca 1537->1540 1542 411dcd-411dd8 1539->1542 1540->1542 1542->1536 1542->1537 1551 411e47-411e5c GetProcessHeap HeapAlloc 1545->1551 1552 411e2b-411e41 call 411cde 1545->1552 1547 411e04-411e0a SetLastError 1546->1547 1549 411f72 1547->1549 1553 411f74 1549->1553 1555 411e70-411ebb call 4117d7 1551->1555 1556 411e5e-411e6e call 411cf5 1551->1556 1552->1551 1560 411e43-411e45 1552->1560 1553->1526 1563 411ec1-411f03 call 411cde call 436990 call 4117ea 1555->1563 1564 411f6b-411f6d call 4120b2 1555->1564 1556->1560 1560->1547 1563->1564 1572 411f05-411f0d 1563->1572 1564->1549 1573 411f0f-411f1c call 411aee 1572->1573 1574 411f1e-411f21 1572->1574 1576 411f24-411f2d call 411b9a 1573->1576 1574->1576 1576->1564 1580 411f2f-411f31 call 41198a 1576->1580 1582 411f36-411f38 1580->1582 1582->1564 1583 411f3a-411f43 call 411abd 1582->1583 1583->1564 1586 411f45-411f4c 1583->1586 1587 411f86 1586->1587 1588 411f4e-411f54 1586->1588 1589 411f8a-411f8c 1587->1589 1590 411f81-411f84 1588->1590 1591 411f56-411f5e 1588->1591 1589->1553 1590->1589 1593 411f60-411f65 SetLastError 1591->1593 1594 411f7c-411f7f 1591->1594 1593->1564 1594->1589
                  APIs
                    • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                  • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                  • GetNativeSystemInfo.KERNELBASE(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                    • Part of subcall function 00411CDE: VirtualAlloc.KERNELBASE(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                    • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                    • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                  • String ID:
                  • API String ID: 3950776272-0
                  • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                  • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                  • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                  • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9

                  Control-flow Graph

                  APIs
                    • Part of subcall function 00413584: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004135A4
                    • Part of subcall function 00413584: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                    • Part of subcall function 00413584: RegCloseKey.KERNELBASE(?), ref: 004135CD
                  • Sleep.KERNELBASE(00000BB8), ref: 0040F896
                  • ExitProcess.KERNEL32 ref: 0040F905
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseExitOpenProcessQuerySleepValue
                  • String ID: 5.1.1 Pro$override$pth_unenc
                  • API String ID: 2281282204-2344886030
                  • Opcode ID: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                  • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                  • Opcode Fuzzy Hash: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                  • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                  APIs
                  • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404F81
                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404FCD
                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                  Strings
                  • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Create$EventLocalThreadTime
                  • String ID: KeepAlive | Enabled | Timeout:
                  • API String ID: 2532271599-1507639952
                  • Opcode ID: 428bc55d4a31c43cbc360544c684b23c3ac7d4a2dd682b4fcf6922528a401838
                  • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                  • Opcode Fuzzy Hash: 428bc55d4a31c43cbc360544c684b23c3ac7d4a2dd682b4fcf6922528a401838
                  • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                  APIs
                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,01560638), ref: 004338DA
                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Crypt$Context$AcquireRandomRelease
                  • String ID:
                  • API String ID: 1815803762-0
                  • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                  • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                  • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                  • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                  APIs
                  • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,004750E4), ref: 0041B6BB
                  • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Name$ComputerUser
                  • String ID:
                  • API String ID: 4229901323-0
                  • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                  • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                  • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                  • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                  APIs
                  • GetLocaleInfoA.KERNELBASE(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.1 Pro), ref: 0040F920
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: InfoLocale
                  • String ID:
                  • API String ID: 2299586839-0
                  • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                  • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                  • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                  • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 51 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 68 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 51->68 69 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 51->69 95 40ef2d-40ef3e call 401fd8 68->95 115 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 69->115 116 40ebe9-40ec04 call 401e65 call 40b9f8 69->116 115->116 146 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 115->146 125 40ec06-40ec25 call 401fab call 413584 116->125 126 40ec3e-40ec45 call 40d0a4 116->126 125->126 145 40ec27-40ec3d call 401fab call 4139e4 125->145 135 40ec47-40ec49 126->135 136 40ec4e-40ec55 126->136 139 40ef2c 135->139 140 40ec57 136->140 141 40ec59-40ec65 call 41b354 136->141 139->95 140->141 150 40ec67-40ec69 141->150 151 40ec6e-40ec72 141->151 145->126 172 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 146->172 150->151 153 40ecb1-40ecc4 call 401e65 call 401fab 151->153 154 40ec74 call 407751 151->154 173 40ecc6 call 407790 153->173 174 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 153->174 163 40ec79-40ec7b 154->163 166 40ec87-40ec9a call 401e65 call 401fab 163->166 167 40ec7d-40ec82 call 407773 call 40729b 163->167 166->153 187 40ec9c-40eca2 166->187 167->166 203 40f3e0-40f3ea call 40dd7d call 414f65 172->203 173->174 223 40ed55-40ed6e call 401e65 call 401fab call 43bb56 174->223 224 40edbb-40edbf 174->224 187->153 190 40eca4-40ecaa 187->190 190->153 193 40ecac call 40729b 190->193 193->153 223->224 250 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 223->250 226 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 224->226 227 40edc5-40edcc 224->227 280 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 226->280 229 40ee4a-40ee54 call 409092 227->229 230 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 227->230 236 40ee59-40ee7d call 40247c call 434829 229->236 230->236 257 40ee8c 236->257 258 40ee7f-40ee8a call 436f10 236->258 250->224 264 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 257->264 258->264 318 40eede-40ef03 call 434832 call 401e65 call 40b9f8 264->318 332 40f017-40f019 280->332 333 40effc 280->333 318->280 334 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 318->334 337 40f01b-40f01d 332->337 338 40f01f 332->338 336 40effe-40f015 call 41ce2c CreateThread 333->336 334->280 352 40ef2a 334->352 339 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 336->339 337->336 338->339 390 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 339->390 391 40f13c 339->391 352->139 392 40f13e-40f156 call 401e65 call 401fab 390->392 391->392 403 40f194-40f1a7 call 401e65 call 401fab 392->403 404 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 392->404 413 40f207-40f21a call 401e65 call 401fab 403->413 414 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 403->414 404->403 425 40f255-40f279 call 41b69e call 401f13 call 401f09 413->425 426 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 413->426 414->413 447 40f27b-40f27c SetProcessDEPPolicy 425->447 448 40f27e-40f291 CreateThread 425->448 426->425 447->448 452 40f293-40f29d CreateThread 448->452 453 40f29f-40f2a6 448->453 452->453 456 40f2b4-40f2bb 453->456 457 40f2a8-40f2b2 CreateThread 453->457 458 40f2c9 456->458 459 40f2bd-40f2c0 456->459 457->456 464 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 458->464 461 40f2c2-40f2c7 459->461 462 40f307-40f31a call 401fab call 41353a 459->462 461->464 471 40f31f-40f322 462->471 464->462 471->203 473 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 471->473 489 40f381-40f386 DeleteFileW 473->489 490 40f388 489->490 491 40f36a-40f36d 489->491 490->172 491->172 492 40f36f-40f37c Sleep call 401f04 491->492 492->489
                  APIs
                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rYhL.exe,00000104), ref: 0040EA29
                    • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                  • String ID: Access Level: $Administrator$C:\Users\user\Desktop\rYhL.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-ZA03K9$Software\$User$del$del$exepath$licence$license_code.txt
                  • API String ID: 2830904901-2183446589
                  • Opcode ID: c545dfb74f45920b6c0413c96d0fb4ea27bf42a7e25e8781ab1141cc06cf4063
                  • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                  • Opcode Fuzzy Hash: c545dfb74f45920b6c0413c96d0fb4ea27bf42a7e25e8781ab1141cc06cf4063
                  • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 494 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 507 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 494->507 508 414faf-414fb6 Sleep 494->508 523 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->523 524 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->524 508->507 523->524 577 415127-41512e 524->577 578 415119-415125 524->578 579 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 577->579 578->579 606 415210-41521e call 40482d 579->606 607 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 579->607 613 415220-415246 call 402093 * 2 call 41b580 606->613 614 41524b-415260 call 404f51 call 4048c8 606->614 630 415ade-415af0 call 404e26 call 4021fa 607->630 613->630 629 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 614->629 614->630 694 4153bb-4153c8 call 405aa6 629->694 695 4153cd-4153f4 call 401fab call 4135e1 629->695 642 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 630->642 643 415b18-415b20 call 401e8d 630->643 642->643 643->524 694->695 701 4153f6-4153f8 695->701 702 4153fb-415532 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c 695->702 701->702 737 415537-415a51 call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 702->737 948 415a53-415a5a 737->948 949 415a65-415a6c 737->949 948->949 950 415a5c-415a5e 948->950 951 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 949->951 952 415a6e-415a73 call 40b08c 949->952 950->949 963 415aac-415ab8 CreateThread 951->963 964 415abe-415ad9 call 401fd8 * 2 call 401f09 951->964 952->951 963->964 964->630
                  APIs
                  • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                  • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Sleep$ErrorLastLocalTime
                  • String ID: | $%I64u$5.1.1 Pro$C:\Users\user\Desktop\rYhL.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-ZA03K9$TLS Off$TLS On $hlight$name
                  • API String ID: 524882891-4230203100
                  • Opcode ID: 9e3fdaea7761b1690e9ede5ba5dca3f06914bc9c1aea57163b469346e9b40227
                  • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                  • Opcode Fuzzy Hash: 9e3fdaea7761b1690e9ede5ba5dca3f06914bc9c1aea57163b469346e9b40227
                  • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                  Control-flow Graph

                  APIs
                  • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                    • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                    • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                    • Part of subcall function 100010F1: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                    • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                    • Part of subcall function 100010F1: FindClose.KERNELBASE(00000000), ref: 100011DB
                  • lstrlenW.KERNEL32(?), ref: 100014C5
                  • lstrlenW.KERNEL32(?), ref: 100014E0
                  • lstrlenW.KERNEL32(?,?), ref: 1000150F
                  • lstrcatW.KERNEL32(00000000), ref: 10001521
                  • lstrlenW.KERNEL32(?,?), ref: 10001547
                  • lstrcatW.KERNEL32(00000000), ref: 10001553
                  • lstrlenW.KERNEL32(?,?), ref: 10001579
                  • lstrcatW.KERNEL32(00000000), ref: 10001585
                  • lstrlenW.KERNEL32(?,?), ref: 100015AB
                  • lstrcatW.KERNEL32(00000000), ref: 100015B7
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                  • String ID: )$Foxmail$ProgramFiles
                  • API String ID: 672098462-2938083778
                  • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                  • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                  • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                  • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1009 4048c8-4048e8 connect 1010 404a1b-404a1f 1009->1010 1011 4048ee-4048f1 1009->1011 1012 404a21-404a2f WSAGetLastError 1010->1012 1013 404a97 1010->1013 1014 404a17-404a19 1011->1014 1015 4048f7-4048fa 1011->1015 1012->1013 1019 404a31-404a34 1012->1019 1016 404a99-404a9e 1013->1016 1014->1016 1017 404926-404930 call 420cf1 1015->1017 1018 4048fc-404923 call 40531e call 402093 call 41b580 1015->1018 1031 404941-40494e call 420f20 1017->1031 1032 404932-40493c 1017->1032 1018->1017 1021 404a71-404a76 1019->1021 1022 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1019->1022 1027 404a7b-404a94 call 402093 * 2 call 41b580 1021->1027 1022->1013 1027->1013 1044 404950-404973 call 402093 * 2 call 41b580 1031->1044 1045 404987-404992 call 421ad1 1031->1045 1032->1027 1070 404976-404982 call 420d31 1044->1070 1056 4049c4-4049d1 call 420e97 1045->1056 1057 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1045->1057 1067 4049d3-4049f6 call 402093 * 2 call 41b580 1056->1067 1068 4049f9-404a14 CreateEventW * 2 1056->1068 1057->1070 1067->1068 1068->1014 1070->1013
                  APIs
                  • connect.WS2_32(FFFFFFFF,0155CD30,00000010), ref: 004048E0
                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                  • WSAGetLastError.WS2_32 ref: 00404A21
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                  • API String ID: 994465650-2151626615
                  • Opcode ID: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                  • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                  • Opcode Fuzzy Hash: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                  • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                  Control-flow Graph

                  APIs
                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                  • closesocket.WS2_32(000000FF), ref: 00404E5A
                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseEvent$ChangeFindNotificationObjectSingleWait$Handleclosesocket
                  • String ID:
                  • API String ID: 1181524730-0
                  • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                  • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                  • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                  • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1101 412aef-412b38 GetModuleFileNameW call 4020df * 3 1108 412b3a-412bc4 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 1101->1108 1133 412bc6-412c56 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1108->1133 1156 412c66 1133->1156 1157 412c58-412c60 Sleep 1133->1157 1158 412c68-412cf8 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1156->1158 1157->1133 1157->1156 1181 412d08 1158->1181 1182 412cfa-412d02 Sleep 1158->1182 1183 412d0a-412d9a call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1181->1183 1182->1158 1182->1181 1206 412daa-412dcf 1183->1206 1207 412d9c-412da4 Sleep 1183->1207 1208 412dd3-412def call 401f04 call 41c516 1206->1208 1207->1183 1207->1206 1213 412df1-412e00 call 401f04 DeleteFileW 1208->1213 1214 412e06-412e22 call 401f04 call 41c516 1208->1214 1213->1214 1221 412e24-412e3d call 401f04 DeleteFileW 1214->1221 1222 412e3f 1214->1222 1224 412e43-412e5f call 401f04 call 41c516 1221->1224 1222->1224 1230 412e61-412e73 call 401f04 DeleteFileW 1224->1230 1231 412e79-412e7b 1224->1231 1230->1231 1233 412e88-412e93 Sleep 1231->1233 1234 412e7d-412e7f 1231->1234 1233->1208 1237 412e99-412eab call 406b63 1233->1237 1234->1233 1236 412e81-412e86 1234->1236 1236->1233 1236->1237 1240 412f01-412f20 call 401f09 * 3 1237->1240 1241 412ead-412ebb call 406b63 1237->1241 1252 412f25-412f5e call 40b93f call 401f04 call 4020f6 call 413268 1240->1252 1241->1240 1246 412ebd-412ecb call 406b63 1241->1246 1246->1240 1253 412ecd-412ef9 Sleep call 401f09 * 3 1246->1253 1268 412f63-412f89 call 401f09 call 405b05 1252->1268 1253->1108 1267 412eff 1253->1267 1267->1252 1273 4130e3-4131dc call 41bdaf call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1268->1273 1274 412f8f-4130de call 41bdaf call 41bc1f call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1268->1274 1343 4131e0-413267 call 401fd8 call 401f09 call 401fd8 * 9 1273->1343 1274->1343
                  APIs
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                  • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                  • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                  • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                  • DeleteFileW.KERNELBASE(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                  • DeleteFileW.KERNELBASE(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                  • DeleteFileW.KERNELBASE(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                  • Sleep.KERNELBASE(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                  • Sleep.KERNEL32(00000064), ref: 00412ECF
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                  • String ID: /stext "
                  • API String ID: 1223786279-3856184850
                  • Opcode ID: 5132b41fb64e7c875b93565344ef7c19bd5b15596ed0d4e4e7589b223b57b8eb
                  • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                  • Opcode Fuzzy Hash: 5132b41fb64e7c875b93565344ef7c19bd5b15596ed0d4e4e7589b223b57b8eb
                  • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1378 40da6f-40da94 call 401f86 1381 40da9a 1378->1381 1382 40dbbe-40dc56 call 401f04 GetLongPathNameW call 40417e * 2 call 40de0c call 402fa5 * 2 call 401f09 * 5 1378->1382 1383 40dae0-40dae7 call 41c048 1381->1383 1384 40daa1-40daa6 1381->1384 1385 40db93-40db98 1381->1385 1386 40dad6-40dadb 1381->1386 1387 40dba9 1381->1387 1388 40db9a-40db9f call 43c11f 1381->1388 1389 40daab-40dab9 call 41b645 call 401f13 1381->1389 1390 40dacc-40dad1 1381->1390 1391 40db8c-40db91 1381->1391 1403 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1383->1403 1404 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1383->1404 1393 40dbae-40dbb3 call 43c11f 1384->1393 1385->1393 1386->1393 1387->1393 1399 40dba4-40dba7 1388->1399 1411 40dabe 1389->1411 1390->1393 1391->1393 1405 40dbb4-40dbb9 call 409092 1393->1405 1399->1387 1399->1405 1417 40dac2-40dac7 call 401f09 1403->1417 1404->1411 1405->1382 1411->1417 1417->1382
                  APIs
                  • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040DBD5
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: LongNamePath
                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                  • API String ID: 82841172-425784914
                  • Opcode ID: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                  • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                  • Opcode Fuzzy Hash: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                  • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1494 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1505 41b3ad-41b3bc call 4135e1 1494->1505 1506 41b3ee-41b3f7 1494->1506 1511 41b3c1-41b3d8 call 401fab StrToIntA 1505->1511 1507 41b400 1506->1507 1508 41b3f9-41b3fe 1506->1508 1510 41b405-41b410 call 40537d 1507->1510 1508->1510 1516 41b3e6-41b3e9 call 401fd8 1511->1516 1517 41b3da-41b3e3 call 41cffa 1511->1517 1516->1506 1517->1516
                  APIs
                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                    • Part of subcall function 004135E1: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                    • Part of subcall function 004135E1: RegCloseKey.KERNELBASE(?), ref: 0041362D
                  • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CloseCurrentOpenQueryValueWow64
                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                  • API String ID: 782494840-2070987746
                  • Opcode ID: 697c2019ecc49fbbbeb48104f1224f3a46b5ec4160ceda2913ffea691057c52c
                  • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                  • Opcode Fuzzy Hash: 697c2019ecc49fbbbeb48104f1224f3a46b5ec4160ceda2913ffea691057c52c
                  • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1595 1000c7e6-1000c7ed GetModuleHandleA 1596 1000c82d 1595->1596 1597 1000c7ef-1000c7fe call 1000c803 1595->1597 1598 1000c82f-1000c833 1596->1598 1606 1000c800-1000c80b GetProcAddress 1597->1606 1607 1000c865 1597->1607 1600 1000c872 call 1000c877 1598->1600 1601 1000c835-1000c83d GetModuleHandleA 1598->1601 1604 1000c83f-1000c847 1601->1604 1604->1604 1608 1000c849-1000c84c 1604->1608 1606->1596 1610 1000c80d-1000c81a VirtualProtect 1606->1610 1609 1000c866-1000c86e 1607->1609 1608->1598 1611 1000c84e-1000c850 1608->1611 1617 1000c870 1609->1617 1613 1000c82c 1610->1613 1614 1000c81c-1000c82a VirtualProtect 1610->1614 1615 1000c852-1000c854 1611->1615 1616 1000c856-1000c85e 1611->1616 1613->1596 1614->1613 1618 1000c85f-1000c860 GetProcAddress 1615->1618 1616->1618 1617->1608 1618->1607
                  APIs
                  • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                  • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                    • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                    • Part of subcall function 1000C803: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                    • Part of subcall function 1000C803: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProcProtectVirtual
                  • String ID:
                  • API String ID: 2099061454-0
                  • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                  • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                  • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                  • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                  APIs
                  • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                    • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                    • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                    • Part of subcall function 1000C7E6: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                    • Part of subcall function 1000C7E6: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProcProtectVirtual
                  • String ID:
                  • API String ID: 2099061454-0
                  • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                  • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                  • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                  • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                  APIs
                  • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                  • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                  • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                  • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: AddressProcProtectVirtual$HandleModule
                  • String ID:
                  • API String ID: 2152742572-0
                  • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                  • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                  • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                  • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                  APIs
                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                  • RegSetValueExA.KERNELBASE(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137E1
                  • RegCloseKey.KERNELBASE(?,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137EC
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateValue
                  • String ID: pth_unenc
                  • API String ID: 1818849710-4028850238
                  • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                  • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                  • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                  • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                  APIs
                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                  • CreateThread.KERNELBASE(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                  • FindCloseChangeNotification.KERNELBASE(00000000,?,00000000), ref: 00404DDB
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                  • String ID:
                  • API String ID: 2579639479-0
                  • Opcode ID: b1d94ccb09ae88335c98018fba1659fd9f6643181a77e83682c5dcad394a06c0
                  • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                  • Opcode Fuzzy Hash: b1d94ccb09ae88335c98018fba1659fd9f6643181a77e83682c5dcad394a06c0
                  • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                  APIs
                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                  • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0041C576
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$ChangeCloseCreateFindNotificationReadSize
                  • String ID:
                  • API String ID: 2135649906-0
                  • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                  • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                  • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                  • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountEventTick
                  • String ID: !D@
                  • API String ID: 180926312-604454484
                  • Opcode ID: e25344dbf1bdc039a8dd0d8a5c793914f244f2089056e2cecb08ba14b45311cb
                  • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                  • Opcode Fuzzy Hash: e25344dbf1bdc039a8dd0d8a5c793914f244f2089056e2cecb08ba14b45311cb
                  • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                  APIs
                  • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                  • GetLastError.KERNEL32 ref: 0040D0BE
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateErrorLastMutex
                  • String ID: Rmc-ZA03K9
                  • API String ID: 1925916568-1363230770
                  • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                  • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                  • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                  • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                  APIs
                  • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                  • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: EventObjectSingleWaitsend
                  • String ID:
                  • API String ID: 3963590051-0
                  • Opcode ID: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                  • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                  • Opcode Fuzzy Hash: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                  • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                  APIs
                  • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                  • RegCloseKey.KERNELBASE(?), ref: 0041362D
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID:
                  • API String ID: 3677997916-0
                  • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                  • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                  • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                  • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                  APIs
                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                  • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                  • RegCloseKey.KERNELBASE(00000000), ref: 00413773
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID:
                  • API String ID: 3677997916-0
                  • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                  • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                  • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                  • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                  APIs
                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004135A4
                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                  • RegCloseKey.KERNELBASE(?), ref: 004135CD
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID:
                  • API String ID: 3677997916-0
                  • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                  • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                  • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                  • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                  APIs
                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C1D7,00466C58), ref: 00413551
                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040C1D7,00466C58), ref: 00413565
                  • RegCloseKey.KERNELBASE(?,?,?,0040C1D7,00466C58), ref: 00413570
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID:
                  • API String ID: 3677997916-0
                  • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                  • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                  • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                  • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                  APIs
                  • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                  • RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                  • RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateValue
                  • String ID:
                  • API String ID: 1818849710-0
                  • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                  • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                  • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                  • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                  APIs
                  • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0041B85B
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: GlobalMemoryStatus
                  • String ID: @
                  • API String ID: 1890195054-2766056989
                  • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                  • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                  • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                  • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                  APIs
                  • _free.LIBCMT ref: 00446227
                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                  • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F93,00000000,0000000F,0042F99D,?,?,00431A44,?,?,00000000), ref: 00446263
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocateHeap$_free
                  • String ID:
                  • API String ID: 1482568997-0
                  • Opcode ID: b10fa1e8472e683284d1f6c52ed4eb802d80ccb8cfc65d6c0dd02300a023487f
                  • Instruction ID: 528349031ecf72c594af6ac828cc426c74ce8c7b4bfa82022820746e0f177899
                  • Opcode Fuzzy Hash: b10fa1e8472e683284d1f6c52ed4eb802d80ccb8cfc65d6c0dd02300a023487f
                  • Instruction Fuzzy Hash: 4CF0283110121176BB213B266C01B6B3759AF83B70B1700ABFC1466281CFBCCC41406F
                  APIs
                  • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                    • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateEventStartupsocket
                  • String ID:
                  • API String ID: 1953588214-0
                  • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                  • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                  • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                  • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                  • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                  • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                  • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                  APIs
                  • GetForegroundWindow.USER32 ref: 0041BB49
                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Window$ForegroundText
                  • String ID:
                  • API String ID: 29597999-0
                  • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                  • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                  • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                  • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                  • Instruction ID: 3af98ca860494c99acd04ebe2bb4cc6dc665ec8dea8eb108ba88c8789d347e54
                  • Opcode Fuzzy Hash: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                  • Instruction Fuzzy Hash: 9411E3B27201019FD7149B18C860BA6B766FF50710F5942AAE256CB3B2DB35EC91CA98
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _wcslen
                  • String ID:
                  • API String ID: 176396367-0
                  • Opcode ID: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                  • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                  • Opcode Fuzzy Hash: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                  • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                  APIs
                  • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                  • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                  • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                  • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                  APIs
                  • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Startup
                  • String ID:
                  • API String ID: 724789610-0
                  • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                  • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                  • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                  • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                  APIs
                  • std::_Deallocate.LIBCONCRT ref: 00402E2B
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Deallocatestd::_
                  • String ID:
                  • API String ID: 1323251999-0
                  • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                  • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                  • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                  • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: recv
                  • String ID:
                  • API String ID: 1507349165-0
                  • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                  • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                  • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                  • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: send
                  • String ID:
                  • API String ID: 2809346765-0
                  • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                  • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                  • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                  • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                  APIs
                  • VirtualAlloc.KERNELBASE(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                  • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                  • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                  • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 004056E6
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  • __Init_thread_footer.LIBCMT ref: 00405723
                  • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                  • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                  • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                  • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                  • CloseHandle.KERNEL32 ref: 00405A23
                  • CloseHandle.KERNEL32 ref: 00405A2B
                  • CloseHandle.KERNEL32 ref: 00405A3D
                  • CloseHandle.KERNEL32 ref: 00405A45
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                  • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                  • API String ID: 2994406822-18413064
                  • Opcode ID: b2d82c10f2debf51222373f7a3e4651be4bb46aebb09b74c8cfb6043f73c9cfb
                  • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                  • Opcode Fuzzy Hash: b2d82c10f2debf51222373f7a3e4651be4bb46aebb09b74c8cfb6043f73c9cfb
                  • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                  APIs
                  • SetEvent.KERNEL32(?,?), ref: 00407CF4
                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                  • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                    • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                    • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                    • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                  • DeleteFileA.KERNEL32(?), ref: 0040868D
                    • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                    • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                    • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                    • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                  • Sleep.KERNEL32(000007D0), ref: 00408733
                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                    • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                  • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                  • API String ID: 1067849700-1507758755
                  • Opcode ID: 510ded21bd0b8ee68d90eb65b5c8c87c35c7cc4917ef3703a3ec0e0f329e9b9c
                  • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                  • Opcode Fuzzy Hash: 510ded21bd0b8ee68d90eb65b5c8c87c35c7cc4917ef3703a3ec0e0f329e9b9c
                  • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                  APIs
                  • GetCurrentProcessId.KERNEL32 ref: 00412141
                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                    • Part of subcall function 004138B2: RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                  • CloseHandle.KERNEL32(00000000), ref: 00412190
                  • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                  • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                  • API String ID: 3018269243-13974260
                  • Opcode ID: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                  • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                  • Opcode Fuzzy Hash: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                  • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                  APIs
                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                  • FindClose.KERNEL32(00000000), ref: 0040BC04
                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                  • FindClose.KERNEL32(00000000), ref: 0040BD4D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$CloseFile$FirstNext
                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                  • API String ID: 1164774033-3681987949
                  • Opcode ID: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                  • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                  • Opcode Fuzzy Hash: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                  • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                  APIs
                  • OpenClipboard.USER32 ref: 004168FD
                  • EmptyClipboard.USER32 ref: 0041690B
                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                  • GlobalLock.KERNEL32(00000000), ref: 00416934
                  • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                  • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                  • CloseClipboard.USER32 ref: 00416990
                  • OpenClipboard.USER32 ref: 00416997
                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                  • CloseClipboard.USER32 ref: 004169BF
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                  • String ID: !D@
                  • API String ID: 3520204547-604454484
                  • Opcode ID: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                  • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                  • Opcode Fuzzy Hash: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                  • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                  APIs
                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                  • FindClose.KERNEL32(00000000), ref: 0040BE04
                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                  • FindClose.KERNEL32(00000000), ref: 0040BEEA
                  • FindClose.KERNEL32(00000000), ref: 0040BF0B
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$Close$File$FirstNext
                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                  • API String ID: 3527384056-432212279
                  • Opcode ID: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                  • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                  • Opcode Fuzzy Hash: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                  • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                  APIs
                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                  • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                  • CloseHandle.KERNEL32(00000000), ref: 0041349A
                  • CloseHandle.KERNEL32(?), ref: 004134A0
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                  • String ID:
                  • API String ID: 297527592-0
                  • Opcode ID: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                  • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                  • Opcode Fuzzy Hash: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                  • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                  APIs
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4F4
                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                  • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                  • API String ID: 3756808967-1743721670
                  • Opcode ID: 5b42a80951eb342c4a971769a7958462a684e848444859b94199bc40bd9fc38b
                  • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                  • Opcode Fuzzy Hash: 5b42a80951eb342c4a971769a7958462a684e848444859b94199bc40bd9fc38b
                  • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 0$1$2$3$4$5$6$7
                  • API String ID: 0-3177665633
                  • Opcode ID: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                  • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                  • Opcode Fuzzy Hash: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                  • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                  APIs
                  • _wcslen.LIBCMT ref: 0040755C
                  • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Object_wcslen
                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • API String ID: 240030777-3166923314
                  • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                  • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                  • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                  • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                  APIs
                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                  • GetLastError.KERNEL32 ref: 0041A84C
                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                  • String ID:
                  • API String ID: 3587775597-0
                  • Opcode ID: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                  • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                  • Opcode Fuzzy Hash: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                  • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                  • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                  • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                  • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                  • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                  • String ID: JD$JD$JD
                  • API String ID: 745075371-3517165026
                  • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                  • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                  • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                  • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                  • FindClose.KERNEL32(00000000), ref: 0040C4B8
                  • FindClose.KERNEL32(00000000), ref: 0040C4E3
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$CloseFile$FirstNext
                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                  • API String ID: 1164774033-405221262
                  • Opcode ID: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                  • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                  • Opcode Fuzzy Hash: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                  • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                  APIs
                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                  • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                  • String ID:
                  • API String ID: 2341273852-0
                  • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                  • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                  • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                  • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                  APIs
                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                  • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                  • GetLastError.KERNEL32 ref: 0040A328
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                  • TranslateMessage.USER32(?), ref: 0040A385
                  • DispatchMessageA.USER32(?), ref: 0040A390
                  Strings
                  • Keylogger initialization failure: error , xrefs: 0040A33C
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                  • String ID: Keylogger initialization failure: error
                  • API String ID: 3219506041-952744263
                  • Opcode ID: 142d2ef2dd7a7f37dd8d92b010d75905bf9ead93cb94639157b9e4adcc72f5f3
                  • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                  • Opcode Fuzzy Hash: 142d2ef2dd7a7f37dd8d92b010d75905bf9ead93cb94639157b9e4adcc72f5f3
                  • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                  APIs
                  • GetForegroundWindow.USER32 ref: 0040A451
                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                  • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                  • GetKeyState.USER32(00000010), ref: 0040A46E
                  • GetKeyboardState.USER32(?), ref: 0040A479
                  • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                  • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                  • String ID:
                  • API String ID: 1888522110-0
                  • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                  • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                  • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                  • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                  APIs
                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                  • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressCloseCreateLibraryLoadProcsend
                  • String ID: SHDeleteKeyW$Shlwapi.dll
                  • API String ID: 2127411465-314212984
                  • Opcode ID: 2ab513c3ad4c60522cec3341cbdb58ff352e593fbf326f90294941f2e684dede
                  • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                  • Opcode Fuzzy Hash: 2ab513c3ad4c60522cec3341cbdb58ff352e593fbf326f90294941f2e684dede
                  • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                  APIs
                  • _free.LIBCMT ref: 00449292
                  • _free.LIBCMT ref: 004492B6
                  • _free.LIBCMT ref: 0044943D
                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                  • _free.LIBCMT ref: 00449609
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                  • String ID:
                  • API String ID: 314583886-0
                  • Opcode ID: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                  • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                  • Opcode Fuzzy Hash: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                  • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                  APIs
                    • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                    • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                    • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                    • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                    • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                  • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                  • String ID: !D@$PowrProf.dll$SetSuspendState
                  • API String ID: 1589313981-2876530381
                  • Opcode ID: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                  • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                  • Opcode Fuzzy Hash: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                  • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                  APIs
                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                  • GetLastError.KERNEL32 ref: 0040BA93
                  Strings
                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                  • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                  • [Chrome StoredLogins not found], xrefs: 0040BAAD
                  • UserProfile, xrefs: 0040BA59
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DeleteErrorFileLast
                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • API String ID: 2018770650-1062637481
                  • Opcode ID: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                  • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                  • Opcode Fuzzy Hash: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                  • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                  APIs
                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                  • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                  • GetLastError.KERNEL32 ref: 004179D8
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                  • String ID: SeShutdownPrivilege
                  • API String ID: 3534403312-3733053543
                  • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                  • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                  • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                  • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                  APIs
                  • __EH_prolog.LIBCMT ref: 00409293
                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,0155CD30,00000010), ref: 004048E0
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                  • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                  • FindClose.KERNEL32(00000000), ref: 004093FC
                    • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                    • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                    • Part of subcall function 00404E26: FindCloseChangeNotification.KERNELBASE(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                  • FindClose.KERNEL32(00000000), ref: 004095F4
                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                  • String ID:
                  • API String ID: 2435342581-0
                  • Opcode ID: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                  • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                  • Opcode Fuzzy Hash: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                  • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                  APIs
                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$Open$ManagerStart
                  • String ID:
                  • API String ID: 276877138-0
                  • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                  • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                  • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                  • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                  APIs
                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                  • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: InfoLocale
                  • String ID: ACP$OCP
                  • API String ID: 2299586839-711371036
                  • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                  • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                  • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                  • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                  APIs
                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                  • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                  • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                  • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Resource$FindLoadLockSizeof
                  • String ID: SETTINGS
                  • API String ID: 3473537107-594951305
                  • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                  • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                  • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                  • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                  APIs
                  • __EH_prolog.LIBCMT ref: 004096A5
                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                  • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$File$CloseFirstH_prologNext
                  • String ID:
                  • API String ID: 1157919129-0
                  • Opcode ID: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                  • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                  • Opcode Fuzzy Hash: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                  • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                  APIs
                  • __EH_prolog.LIBCMT ref: 0040884C
                  • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                  • String ID:
                  • API String ID: 1771804793-0
                  • Opcode ID: 99a3056b48020488f4a7cc8d14455ae8aa2eebd7be9758c69deaf4fbc99c6cac
                  • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                  • Opcode Fuzzy Hash: 99a3056b48020488f4a7cc8d14455ae8aa2eebd7be9758c69deaf4fbc99c6cac
                  • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                  APIs
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DownloadExecuteFileShell
                  • String ID: C:\Users\user\Desktop\rYhL.exe$open
                  • API String ID: 2825088817-1009904352
                  • Opcode ID: 554e9b605ff2fb2cc0c881b67baa82593a7bc908e417def6973a3d8b17cb2bbb
                  • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                  • Opcode Fuzzy Hash: 554e9b605ff2fb2cc0c881b67baa82593a7bc908e417def6973a3d8b17cb2bbb
                  • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                  APIs
                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                    • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                    • Part of subcall function 004137AA: RegSetValueExA.KERNELBASE(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137E1
                    • Part of subcall function 004137AA: RegCloseKey.KERNELBASE(?,?,?,0040F88E,004674C8,5.1.1 Pro), ref: 004137EC
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateInfoParametersSystemValue
                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                  • API String ID: 4127273184-3576401099
                  • Opcode ID: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                  • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                  • Opcode Fuzzy Hash: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                  • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                  • _wcschr.LIBVCRUNTIME ref: 00451ECA
                  • _wcschr.LIBVCRUNTIME ref: 00451ED8
                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                  • String ID:
                  • API String ID: 4212172061-0
                  • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                  • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                  • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                  • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                  • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                  • String ID: p'E$JD
                  • API String ID: 1084509184-908320845
                  • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                  • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                  • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                  • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorInfoLastLocale$_free$_abort
                  • String ID:
                  • API String ID: 2829624132-0
                  • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                  • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                  • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                  • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                  APIs
                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                  • String ID:
                  • API String ID: 3906539128-0
                  • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                  • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                  • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                  • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                  APIs
                  • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                  • String ID:
                  • API String ID: 3906539128-0
                  • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                  • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                  • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                  • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                  APIs
                  • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                  • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                  • ExitProcess.KERNEL32 ref: 10004AEE
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: Process$CurrentExitTerminate
                  • String ID:
                  • API String ID: 1703294689-0
                  • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                  • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                  • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                  • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                  APIs
                  • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                  • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                  • ExitProcess.KERNEL32 ref: 0044338F
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CurrentExitTerminate
                  • String ID:
                  • API String ID: 1703294689-0
                  • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                  • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                  • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                  • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                  APIs
                  • OpenClipboard.USER32(00000000), ref: 0040B74C
                  • GetClipboardData.USER32(0000000D), ref: 0040B758
                  • CloseClipboard.USER32 ref: 0040B760
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Clipboard$CloseDataOpen
                  • String ID:
                  • API String ID: 2058664381-0
                  • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                  • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                  • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                  • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                  APIs
                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                  • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                  • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CloseHandleOpenResume
                  • String ID:
                  • API String ID: 3614150671-0
                  • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                  • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                  • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                  • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                  APIs
                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                  • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                  • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CloseHandleOpenSuspend
                  • String ID:
                  • API String ID: 1999457699-0
                  • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                  • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                  • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                  • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: FeaturePresentProcessor
                  • String ID: MZ@
                  • API String ID: 2325560087-2978689999
                  • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                  • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                  • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                  • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: .
                  • API String ID: 0-248832578
                  • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                  • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                  • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                  • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: .
                  • API String ID: 0-248832578
                  • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                  • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                  • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                  • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                  • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                  • String ID: JD
                  • API String ID: 1084509184-2669065882
                  • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                  • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                  • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                  • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                  APIs
                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: InfoLocale
                  • String ID: GetLocaleInfoEx
                  • API String ID: 2299586839-2904428671
                  • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                  • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                  • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                  • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                    • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Find$CreateFirstNext
                  • String ID:
                  • API String ID: 341183262-0
                  • Opcode ID: a6b0f0b6856f9095ef9e1409d09152403c2d65749c6e8fc892ba81e496e47422
                  • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                  • Opcode Fuzzy Hash: a6b0f0b6856f9095ef9e1409d09152403c2d65749c6e8fc892ba81e496e47422
                  • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$FirstNextsend
                  • String ID:
                  • API String ID: 4113138495-0
                  • Opcode ID: fd6193630a935a9c0783525d90d8abb728b5b23f535aeb2500ec47bbe22b8f4c
                  • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                  • Opcode Fuzzy Hash: fd6193630a935a9c0783525d90d8abb728b5b23f535aeb2500ec47bbe22b8f4c
                  • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$_free$InfoLocale_abort
                  • String ID:
                  • API String ID: 1663032902-0
                  • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                  • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                  • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                  • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$InfoLocale_abort_free
                  • String ID:
                  • API String ID: 2692324296-0
                  • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                  • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                  • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                  • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                  APIs
                    • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                  • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalEnterEnumLocalesSectionSystem
                  • String ID:
                  • API String ID: 1272433827-0
                  • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                  • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                  • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                  • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                  • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                  • String ID:
                  • API String ID: 1084509184-0
                  • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                  • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                  • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                  • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                  • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                  • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                  • Instruction Fuzzy Hash:
                  APIs
                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                  • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                    • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                  • DeleteDC.GDI32(00000000), ref: 00418F65
                  • DeleteDC.GDI32(00000000), ref: 00418F68
                  • DeleteObject.GDI32(00000000), ref: 00418F6B
                  • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                  • DeleteDC.GDI32(00000000), ref: 00418F9D
                  • DeleteDC.GDI32(00000000), ref: 00418FA0
                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                  • GetCursorInfo.USER32(?), ref: 00418FE2
                  • GetIconInfo.USER32(?,?), ref: 00418FF8
                  • DeleteObject.GDI32(?), ref: 00419027
                  • DeleteObject.GDI32(?), ref: 00419034
                  • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                  • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                  • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                  • DeleteDC.GDI32(?), ref: 004191B7
                  • DeleteDC.GDI32(00000000), ref: 004191BA
                  • DeleteObject.GDI32(00000000), ref: 004191BD
                  • GlobalFree.KERNEL32(?), ref: 004191C8
                  • DeleteObject.GDI32(00000000), ref: 0041927C
                  • GlobalFree.KERNEL32(?), ref: 00419283
                  • DeleteDC.GDI32(?), ref: 00419293
                  • DeleteDC.GDI32(00000000), ref: 0041929E
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                  • String ID: DISPLAY
                  • API String ID: 4256916514-865373369
                  • Opcode ID: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                  • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                  • Opcode Fuzzy Hash: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                  • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                  APIs
                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,pth_unenc), ref: 0040B910
                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                  • ExitProcess.KERNEL32 ref: 0040D80B
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                  • String ID: """, 0$")$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                  • API String ID: 1861856835-2731992618
                  • Opcode ID: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                  • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                  • Opcode Fuzzy Hash: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                  • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                  APIs
                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                  • SetEvent.KERNEL32 ref: 0041B2AA
                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                  • CloseHandle.KERNEL32 ref: 0041B2CB
                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                  • API String ID: 738084811-2094122233
                  • Opcode ID: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                  • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                  • Opcode Fuzzy Hash: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                  • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                  APIs
                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,pth_unenc), ref: 0040B910
                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                  • ExitProcess.KERNEL32 ref: 0040D454
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                  • String ID: ")$.vbs$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                  • API String ID: 3797177996-2101481668
                  • Opcode ID: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                  • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                  • Opcode Fuzzy Hash: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                  • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                  APIs
                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                  • ExitProcess.KERNEL32(00000000), ref: 004124DB
                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                  • CloseHandle.KERNEL32(00000000), ref: 00412576
                  • GetCurrentProcessId.KERNEL32 ref: 0041257C
                  • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                  • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                  • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                  • Sleep.KERNEL32(000001F4), ref: 004126BD
                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                  • CloseHandle.KERNEL32(00000000), ref: 004126E4
                  • GetCurrentProcessId.KERNEL32 ref: 004126EA
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                  • String ID: .exe$WDH$exepath$open$temp_
                  • API String ID: 2649220323-3088914985
                  • Opcode ID: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                  • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                  • Opcode Fuzzy Hash: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                  • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                  APIs
                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                  • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                  • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                  • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Write$Create
                  • String ID: RIFF$WAVE$data$fmt
                  • API String ID: 1602526932-4212202414
                  • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                  • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                  • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                  • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                  APIs
                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\rYhL.exe,00000001,00407688,C:\Users\user\Desktop\rYhL.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                  • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                  • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                  • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                  • GetProcAddress.KERNEL32(00000000), ref: 00407308
                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                  • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                  • GetProcAddress.KERNEL32(00000000), ref: 00407330
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: C:\Users\user\Desktop\rYhL.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                  • API String ID: 1646373207-2002640742
                  • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                  • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                  • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                  • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                  APIs
                    • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                    • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                    • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                  • _strlen.LIBCMT ref: 10001855
                  • _strlen.LIBCMT ref: 10001869
                  • _strlen.LIBCMT ref: 1000188B
                  • _strlen.LIBCMT ref: 100018AE
                  • _strlen.LIBCMT ref: 100018C8
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _strlen$File$CopyCreateDelete
                  • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                  • API String ID: 3296212668-3023110444
                  • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                  • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                  • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                  • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                  APIs
                  • _wcslen.LIBCMT ref: 0040CE42
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\rYhL.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                  • _wcslen.LIBCMT ref: 0040CF21
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\rYhL.exe,00000000,00000000), ref: 0040CFBF
                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                  • _wcslen.LIBCMT ref: 0040D001
                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                  • ExitProcess.KERNEL32 ref: 0040D09D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                  • String ID: 6$C:\Users\user\Desktop\rYhL.exe$del$open
                  • API String ID: 1579085052-1473645244
                  • Opcode ID: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                  • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                  • Opcode Fuzzy Hash: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                  • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                  APIs
                  • lstrlenW.KERNEL32(?), ref: 0041C0C7
                  • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                  • lstrlenW.KERNEL32(?), ref: 0041C0F8
                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                  • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                  • _wcslen.LIBCMT ref: 0041C1CC
                  • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                  • GetLastError.KERNEL32 ref: 0041C204
                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                  • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                  • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                  • GetLastError.KERNEL32 ref: 0041C261
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                  • String ID: ?
                  • API String ID: 3941738427-1684325040
                  • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                  • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                  • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                  • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _strlen
                  • String ID: %m$~$Gon~$~F@7$~dra
                  • API String ID: 4218353326-230879103
                  • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                  • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                  • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                  • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$EnvironmentVariable$_wcschr
                  • String ID:
                  • API String ID: 3899193279-0
                  • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                  • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                  • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                  • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                  APIs
                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                  • LoadLibraryA.KERNEL32(?), ref: 00414E52
                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                  • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                  • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                  • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                  • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                  • API String ID: 2490988753-744132762
                  • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                  • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                  • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                  • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                  APIs
                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                  • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseEnumOpen
                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                  • API String ID: 1332880857-3714951968
                  • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                  • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                  • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                  • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                  APIs
                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                  • GetCursorPos.USER32(?), ref: 0041D67A
                  • SetForegroundWindow.USER32(?), ref: 0041D683
                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                  • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                  • ExitProcess.KERNEL32 ref: 0041D6F6
                  • CreatePopupMenu.USER32 ref: 0041D6FC
                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                  • String ID: Close
                  • API String ID: 1657328048-3535843008
                  • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                  • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                  • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                  • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$Info
                  • String ID:
                  • API String ID: 2509303402-0
                  • Opcode ID: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                  • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                  • Opcode Fuzzy Hash: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                  • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                  APIs
                  • ___free_lconv_mon.LIBCMT ref: 10007D06
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                    • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                  • _free.LIBCMT ref: 10007CFB
                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                  • _free.LIBCMT ref: 10007D1D
                  • _free.LIBCMT ref: 10007D32
                  • _free.LIBCMT ref: 10007D3D
                  • _free.LIBCMT ref: 10007D5F
                  • _free.LIBCMT ref: 10007D72
                  • _free.LIBCMT ref: 10007D80
                  • _free.LIBCMT ref: 10007D8B
                  • _free.LIBCMT ref: 10007DC3
                  • _free.LIBCMT ref: 10007DCA
                  • _free.LIBCMT ref: 10007DE7
                  • _free.LIBCMT ref: 10007DFF
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                  • String ID:
                  • API String ID: 161543041-0
                  • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                  • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                  • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                  • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                  APIs
                  • ___free_lconv_mon.LIBCMT ref: 0045138A
                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                  • _free.LIBCMT ref: 0045137F
                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                  • _free.LIBCMT ref: 004513A1
                  • _free.LIBCMT ref: 004513B6
                  • _free.LIBCMT ref: 004513C1
                  • _free.LIBCMT ref: 004513E3
                  • _free.LIBCMT ref: 004513F6
                  • _free.LIBCMT ref: 00451404
                  • _free.LIBCMT ref: 0045140F
                  • _free.LIBCMT ref: 00451447
                  • _free.LIBCMT ref: 0045144E
                  • _free.LIBCMT ref: 0045146B
                  • _free.LIBCMT ref: 00451483
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                  • String ID:
                  • API String ID: 161543041-0
                  • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                  • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                  • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                  • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                  APIs
                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                  • __aulldiv.LIBCMT ref: 00408D88
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                  • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                  • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                  • CloseHandle.KERNEL32(00000000), ref: 00409037
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                  • API String ID: 3086580692-2596673759
                  • Opcode ID: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                  • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                  • Opcode Fuzzy Hash: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                  • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free
                  • String ID:
                  • API String ID: 269201875-0
                  • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                  • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                  • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                  • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                  APIs
                    • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                  • GetLastError.KERNEL32 ref: 00455D6F
                  • __dosmaperr.LIBCMT ref: 00455D76
                  • GetFileType.KERNEL32(00000000), ref: 00455D82
                  • GetLastError.KERNEL32 ref: 00455D8C
                  • __dosmaperr.LIBCMT ref: 00455D95
                  • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                  • CloseHandle.KERNEL32(?), ref: 00455EFF
                  • GetLastError.KERNEL32 ref: 00455F31
                  • __dosmaperr.LIBCMT ref: 00455F38
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                  • String ID: H
                  • API String ID: 4237864984-2852464175
                  • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                  • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                  • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                  • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free
                  • String ID: \&G$\&G$`&G
                  • API String ID: 269201875-253610517
                  • Opcode ID: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                  • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                  • Opcode Fuzzy Hash: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                  • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 65535$udp
                  • API String ID: 0-1267037602
                  • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                  • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                  • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                  • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 0040AD73
                  • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                  • GetForegroundWindow.USER32 ref: 0040AD84
                  • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                  • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                  • String ID: [${ User has been idle for $ minutes }$]
                  • API String ID: 911427763-3954389425
                  • Opcode ID: 48f1adaacdea2f975f01b8500f115fca2f5cc24c7704d57e661a1b5e6bda6b32
                  • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                  • Opcode Fuzzy Hash: 48f1adaacdea2f975f01b8500f115fca2f5cc24c7704d57e661a1b5e6bda6b32
                  • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                  APIs
                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                    • Part of subcall function 00413733: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                    • Part of subcall function 00413733: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                    • Part of subcall function 00413733: RegCloseKey.KERNELBASE(00000000), ref: 00413773
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                  • ExitProcess.KERNEL32 ref: 0040D9FF
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                  • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                  • API String ID: 1913171305-2411266221
                  • Opcode ID: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                  • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                  • Opcode Fuzzy Hash: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                  • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                  • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                  • __dosmaperr.LIBCMT ref: 0043A926
                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                  • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                  • __dosmaperr.LIBCMT ref: 0043A963
                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                  • __dosmaperr.LIBCMT ref: 0043A9B7
                  • _free.LIBCMT ref: 0043A9C3
                  • _free.LIBCMT ref: 0043A9CA
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                  • String ID:
                  • API String ID: 2441525078-0
                  • Opcode ID: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                  • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                  • Opcode Fuzzy Hash: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                  • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                  APIs
                  • SetEvent.KERNEL32(?,?), ref: 004054BF
                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                  • TranslateMessage.USER32(?), ref: 0040557E
                  • DispatchMessageA.USER32(?), ref: 00405589
                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                  • String ID: CloseChat$DisplayMessage$GetMessage
                  • API String ID: 2956720200-749203953
                  • Opcode ID: e50701ba2810b08a2007b088f92198fb680677478e9d1ab3d863ca3120f960c8
                  • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                  • Opcode Fuzzy Hash: e50701ba2810b08a2007b088f92198fb680677478e9d1ab3d863ca3120f960c8
                  • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                  APIs
                  • OpenClipboard.USER32 ref: 0041697C
                  • EmptyClipboard.USER32 ref: 0041698A
                  • CloseClipboard.USER32 ref: 00416990
                  • OpenClipboard.USER32 ref: 00416997
                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                  • CloseClipboard.USER32 ref: 004169BF
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                  • String ID: !D@
                  • API String ID: 2172192267-604454484
                  • Opcode ID: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                  • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                  • Opcode Fuzzy Hash: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                  • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                  APIs
                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$Open$ControlManager
                  • String ID:
                  • API String ID: 221034970-0
                  • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                  • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                  • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                  • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                  APIs
                  • _free.LIBCMT ref: 100059EA
                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                  • _free.LIBCMT ref: 100059F6
                  • _free.LIBCMT ref: 10005A01
                  • _free.LIBCMT ref: 10005A0C
                  • _free.LIBCMT ref: 10005A17
                  • _free.LIBCMT ref: 10005A22
                  • _free.LIBCMT ref: 10005A2D
                  • _free.LIBCMT ref: 10005A38
                  • _free.LIBCMT ref: 10005A43
                  • _free.LIBCMT ref: 10005A51
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                  • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                  • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                  • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                  APIs
                  • _free.LIBCMT ref: 004481B5
                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                  • _free.LIBCMT ref: 004481C1
                  • _free.LIBCMT ref: 004481CC
                  • _free.LIBCMT ref: 004481D7
                  • _free.LIBCMT ref: 004481E2
                  • _free.LIBCMT ref: 004481ED
                  • _free.LIBCMT ref: 004481F8
                  • _free.LIBCMT ref: 00448203
                  • _free.LIBCMT ref: 0044820E
                  • _free.LIBCMT ref: 0044821C
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                  • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                  • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                  • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                  APIs
                  • __EH_prolog.LIBCMT ref: 0041A04A
                  • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                  • Sleep.KERNEL32(000003E8), ref: 0041A18E
                  • GetLocalTime.KERNEL32(?), ref: 0041A196
                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                  • API String ID: 489098229-3790400642
                  • Opcode ID: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                  • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                  • Opcode Fuzzy Hash: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                  • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                  APIs
                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DecodePointer
                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                  • API String ID: 3527080286-3064271455
                  • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                  • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                  • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                  • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                  APIs
                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                    • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                  • Sleep.KERNEL32(00000064), ref: 0041755C
                  • DeleteFileW.KERNEL32(00000000), ref: 00417590
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CreateDeleteExecuteShellSleep
                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                  • API String ID: 1462127192-2001430897
                  • Opcode ID: f12e1a09c6e255144d90da2c79bf1f1cd4418c09111891b4f18985c985915801
                  • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                  • Opcode Fuzzy Hash: f12e1a09c6e255144d90da2c79bf1f1cd4418c09111891b4f18985c985915801
                  • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                  APIs
                  • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                  • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\Desktop\rYhL.exe), ref: 004074D9
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentProcess
                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                  • API String ID: 2050909247-4242073005
                  • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                  • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                  • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                  • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                  APIs
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                  • int.LIBCPMT ref: 00410EBC
                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                  • std::_Facet_Register.LIBCPMT ref: 00410EFC
                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                  • __Init_thread_footer.LIBCMT ref: 00410F64
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                  • String ID: ,kG$0kG
                  • API String ID: 3815856325-2015055088
                  • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                  • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                  • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                  • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                  APIs
                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                    • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                    • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                    • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                  • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                  • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                  • TranslateMessage.USER32(?), ref: 0041D57A
                  • DispatchMessageA.USER32(?), ref: 0041D584
                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                  • String ID: Remcos
                  • API String ID: 1970332568-165870891
                  • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                  • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                  • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                  • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                  • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                  • Opcode Fuzzy Hash: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                  • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                  APIs
                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                  • __alloca_probe_16.LIBCMT ref: 00453F6A
                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                  • __alloca_probe_16.LIBCMT ref: 00454014
                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                  • __freea.LIBCMT ref: 00454083
                  • __freea.LIBCMT ref: 0045408F
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                  • String ID:
                  • API String ID: 201697637-0
                  • Opcode ID: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                  • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                  • Opcode Fuzzy Hash: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                  • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                  APIs
                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                  • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: File$Delete$CloseCopyCreateHandleReadSize
                  • String ID:
                  • API String ID: 1454806937-0
                  • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                  • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                  • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                  • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                  APIs
                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                  • _memcmp.LIBVCRUNTIME ref: 004454A4
                  • _free.LIBCMT ref: 00445515
                  • _free.LIBCMT ref: 0044552E
                  • _free.LIBCMT ref: 00445560
                  • _free.LIBCMT ref: 00445569
                  • _free.LIBCMT ref: 00445575
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$ErrorLast$_abort_memcmp
                  • String ID: C
                  • API String ID: 1679612858-1037565863
                  • Opcode ID: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                  • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                  • Opcode Fuzzy Hash: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                  • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: tcp$udp
                  • API String ID: 0-3725065008
                  • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                  • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                  • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                  • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Eventinet_ntoa
                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                  • API String ID: 3578746661-168337528
                  • Opcode ID: 348bdbcb9aa74a474ef0fe2107d5f62273700c35e723e5218f8a24d9f3e6a337
                  • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                  • Opcode Fuzzy Hash: 348bdbcb9aa74a474ef0fe2107d5f62273700c35e723e5218f8a24d9f3e6a337
                  • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                  APIs
                    • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                  • CloseHandle.KERNEL32(00000000), ref: 00417E20
                  • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                  • String ID: <$@$Temp
                  • API String ID: 1704390241-1032778388
                  • Opcode ID: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                  • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                  • Opcode Fuzzy Hash: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                  • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                  APIs
                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                    • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                    • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                  • String ID: .part
                  • API String ID: 1303771098-3499674018
                  • Opcode ID: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                  • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                  • Opcode Fuzzy Hash: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                  • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                  APIs
                  • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                  • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                  • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Console$Window$AllocOutputShow
                  • String ID: Remcos v$5.1.1 Pro$CONOUT$
                  • API String ID: 4067487056-3820604032
                  • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                  • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                  • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                  • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                  • __alloca_probe_16.LIBCMT ref: 0044AD5B
                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                  • __alloca_probe_16.LIBCMT ref: 0044AE40
                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                  • __freea.LIBCMT ref: 0044AEB0
                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                  • __freea.LIBCMT ref: 0044AEB9
                  • __freea.LIBCMT ref: 0044AEDE
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                  • String ID:
                  • API String ID: 3864826663-0
                  • Opcode ID: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                  • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                  • Opcode Fuzzy Hash: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                  • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                  APIs
                  • SendInput.USER32 ref: 00419A25
                  • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                  • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                    • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: InputSend$Virtual
                  • String ID:
                  • API String ID: 1167301434-0
                  • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                  • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                  • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                  • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: __freea$__alloca_probe_16_free
                  • String ID: a/p$am/pm$h{D
                  • API String ID: 2936374016-2303565833
                  • Opcode ID: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                  • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                  • Opcode Fuzzy Hash: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                  • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                  APIs
                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                  • _free.LIBCMT ref: 00444E87
                  • _free.LIBCMT ref: 00444E9E
                  • _free.LIBCMT ref: 00444EBD
                  • _free.LIBCMT ref: 00444ED8
                  • _free.LIBCMT ref: 00444EEF
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$AllocateHeap
                  • String ID: KED
                  • API String ID: 3033488037-2133951994
                  • Opcode ID: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                  • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                  • Opcode Fuzzy Hash: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                  • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                  APIs
                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                  • __fassign.LIBCMT ref: 1000954F
                  • __fassign.LIBCMT ref: 1000956A
                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                  • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                  • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                  • String ID:
                  • API String ID: 1324828854-0
                  • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                  • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                  • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                  • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                  APIs
                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                  • __fassign.LIBCMT ref: 0044B4F9
                  • __fassign.LIBCMT ref: 0044B514
                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                  • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                  • String ID:
                  • API String ID: 1324828854-0
                  • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                  • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                  • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                  • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                  APIs
                  • _ValidateLocalCookies.LIBCMT ref: 1000339B
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                  • _ValidateLocalCookies.LIBCMT ref: 10003431
                  • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                  • _ValidateLocalCookies.LIBCMT ref: 100034B1
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                  • String ID: csm
                  • API String ID: 1170836740-1018135373
                  • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                  • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                  • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                  • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                  APIs
                    • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                    • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                    • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                  • _wcslen.LIBCMT ref: 0041B7F4
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                  • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                  • API String ID: 3286818993-122982132
                  • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                  • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                  • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                  • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                  APIs
                  • _strftime.LIBCMT ref: 00401D50
                    • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                  • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                  • String ID: %Y-%m-%d %H.%M$.wav
                  • API String ID: 3809562944-3597965672
                  • Opcode ID: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                  • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                  • Opcode Fuzzy Hash: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                  • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                  APIs
                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                    • Part of subcall function 004135E1: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                    • Part of subcall function 004135E1: RegCloseKey.KERNELBASE(?), ref: 0041362D
                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                  • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                  • API String ID: 1133728706-4073444585
                  • Opcode ID: fca4e0d28d89a9fa445d0ae1acaca183aa99da9c1d1975f14c0158772a6bba34
                  • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                  • Opcode Fuzzy Hash: fca4e0d28d89a9fa445d0ae1acaca183aa99da9c1d1975f14c0158772a6bba34
                  • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                  • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                  • Opcode Fuzzy Hash: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                  • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                  APIs
                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                  • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                  • CloseHandle.KERNEL32(00000000), ref: 0041C508
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseHandle$CreatePointerWrite
                  • String ID: xpF
                  • API String ID: 1852769593-354647465
                  • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                  • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                  • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                  • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                  APIs
                    • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                  • _free.LIBCMT ref: 100092AB
                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                  • _free.LIBCMT ref: 100092B6
                  • _free.LIBCMT ref: 100092C1
                  • _free.LIBCMT ref: 10009315
                  • _free.LIBCMT ref: 10009320
                  • _free.LIBCMT ref: 1000932B
                  • _free.LIBCMT ref: 10009336
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                  • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                  • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                  • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                  APIs
                    • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                  • _free.LIBCMT ref: 00450FC8
                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                  • _free.LIBCMT ref: 00450FD3
                  • _free.LIBCMT ref: 00450FDE
                  • _free.LIBCMT ref: 00451032
                  • _free.LIBCMT ref: 0045103D
                  • _free.LIBCMT ref: 00451048
                  • _free.LIBCMT ref: 00451053
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                  • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                  • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                  • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                  APIs
                  • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                  • int.LIBCPMT ref: 004111BE
                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                  • std::_Facet_Register.LIBCPMT ref: 004111FE
                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                  • String ID: (mG
                  • API String ID: 2536120697-4059303827
                  • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                  • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                  • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                  • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                  APIs
                  • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                  • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                  • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                  • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                  • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                  APIs
                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\rYhL.exe), ref: 0040760B
                    • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                    • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                  • CoUninitialize.OLE32 ref: 00407664
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeObjectUninitialize_wcslen
                  • String ID: C:\Users\user\Desktop\rYhL.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                  • API String ID: 3851391207-2570517665
                  • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                  • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                  • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                  • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                  APIs
                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                  • GetLastError.KERNEL32 ref: 0040BB22
                  Strings
                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                  • [Chrome Cookies not found], xrefs: 0040BB3C
                  • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                  • UserProfile, xrefs: 0040BAE8
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DeleteErrorFileLast
                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                  • API String ID: 2018770650-304995407
                  • Opcode ID: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                  • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                  • Opcode Fuzzy Hash: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                  • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                  APIs
                  • __allrem.LIBCMT ref: 0043ACE9
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                  • __allrem.LIBCMT ref: 0043AD1C
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                  • __allrem.LIBCMT ref: 0043AD51
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                  • String ID:
                  • API String ID: 1992179935-0
                  • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                  • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                  • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                  • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                  • __freea.LIBCMT ref: 10008A08
                    • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                  • __freea.LIBCMT ref: 10008A11
                  • __freea.LIBCMT ref: 10008A36
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                  • String ID:
                  • API String ID: 1414292761-0
                  • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                  • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                  • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                  • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                  APIs
                  • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                    • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: H_prologSleep
                  • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                  • API String ID: 3469354165-3054508432
                  • Opcode ID: 8d82a21dd54fd804bc30d3cde12e5ff05ebf2b22109c2ee77afaa6a55a21664b
                  • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                  • Opcode Fuzzy Hash: 8d82a21dd54fd804bc30d3cde12e5ff05ebf2b22109c2ee77afaa6a55a21664b
                  • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: __cftoe
                  • String ID:
                  • API String ID: 4189289331-0
                  • Opcode ID: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                  • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                  • Opcode Fuzzy Hash: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                  • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                  APIs
                  • Sleep.KERNEL32(00001388), ref: 0040A77B
                    • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                    • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                    • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                    • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                  • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                    • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                  • String ID:
                  • API String ID: 3795512280-0
                  • Opcode ID: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                  • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                  • Opcode Fuzzy Hash: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                  • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                  APIs
                  • _strlen.LIBCMT ref: 10001607
                  • _strcat.LIBCMT ref: 1000161D
                  • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                  • lstrcatW.KERNEL32(?,?), ref: 1000165A
                  • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                  • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: lstrcatlstrlen$_strcat_strlen
                  • String ID:
                  • API String ID: 1922816806-0
                  • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                  • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                  • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                  • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                  APIs
                  • lstrcatW.KERNEL32(?,?), ref: 10001038
                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                  • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: lstrlen$AttributesFilelstrcat
                  • String ID:
                  • API String ID: 3594823470-0
                  • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                  • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                  • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                  • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                  APIs
                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                  • String ID:
                  • API String ID: 493672254-0
                  • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                  • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                  • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                  • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                  APIs
                  • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                  • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                  • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                  • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                  • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                  APIs
                  • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                  • _free.LIBCMT ref: 10005B2D
                  • _free.LIBCMT ref: 10005B55
                  • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                  • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                  • _abort.LIBCMT ref: 10005B74
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: ErrorLast$_free$_abort
                  • String ID:
                  • API String ID: 3160817290-0
                  • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                  • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                  • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                  • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                  APIs
                  • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                  • _free.LIBCMT ref: 004482CC
                  • _free.LIBCMT ref: 004482F4
                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                  • _abort.LIBCMT ref: 00448313
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$_free$_abort
                  • String ID:
                  • API String ID: 3160817290-0
                  • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                  • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                  • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                  • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                  APIs
                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$Open$ControlManager
                  • String ID:
                  • API String ID: 221034970-0
                  • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                  • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                  • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                  • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                  APIs
                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$Open$ControlManager
                  • String ID:
                  • API String ID: 221034970-0
                  • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                  • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                  • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                  • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                  APIs
                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Service$CloseHandle$Open$ControlManager
                  • String ID:
                  • API String ID: 221034970-0
                  • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                  • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                  • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                  • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 004018BE
                  • ExitThread.KERNEL32 ref: 004018F6
                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                  • String ID: PkG$NG
                  • API String ID: 1649129571-2686071003
                  • Opcode ID: ad24df347d0372f3bcd0a455a481e024bc46b11d98dd265ab576ac300c6fc75c
                  • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                  • Opcode Fuzzy Hash: ad24df347d0372f3bcd0a455a481e024bc46b11d98dd265ab576ac300c6fc75c
                  • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                  APIs
                    • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                    • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                    • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                    • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                    • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                  • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                    • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                    • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: lstrlen$_strlenlstrcat$AttributesFile
                  • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                  • API String ID: 4036392271-1520055953
                  • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                  • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                  • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                  • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                  APIs
                  • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                  • wsprintfW.USER32 ref: 0040B22E
                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: EventLocalTimewsprintf
                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                  • API String ID: 1497725170-248792730
                  • Opcode ID: e3693a350b1622166f97d02a0b5d86e181ebd5c9cb8161137e773e05ea357f11
                  • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                  • Opcode Fuzzy Hash: e3693a350b1622166f97d02a0b5d86e181ebd5c9cb8161137e773e05ea357f11
                  • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                  APIs
                  • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                  • GetLastError.KERNEL32 ref: 0041D611
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ClassCreateErrorLastRegisterWindow
                  • String ID: 0$MsgWindowClass
                  • API String ID: 2877667751-2410386613
                  • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                  • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                  • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                  • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                  APIs
                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                  • CloseHandle.KERNEL32(?), ref: 004077E5
                  • CloseHandle.KERNEL32(?), ref: 004077EA
                  Strings
                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                  • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandle$CreateProcess
                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                  • API String ID: 2922976086-4183131282
                  • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                  • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                  • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                  • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: C:\Users\user\Desktop\rYhL.exe$Rmc-ZA03K9
                  • API String ID: 0-2164444004
                  • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                  • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                  • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                  • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                  • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                  • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                  • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                  • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                  • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                  • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                  • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                  APIs
                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                  • String ID: KeepAlive | Disabled
                  • API String ID: 2993684571-305739064
                  • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                  • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                  • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                  • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                  APIs
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                  • Sleep.KERNEL32(00002710), ref: 0041AE98
                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: PlaySound$HandleLocalModuleSleepTime
                  • String ID: Alarm triggered
                  • API String ID: 614609389-2816303416
                  • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                  • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                  • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                  • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                  APIs
                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                  Strings
                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                  • API String ID: 3024135584-2418719853
                  • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                  • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                  • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                  • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                  • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                  • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                  • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                  APIs
                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                  • _free.LIBCMT ref: 0044943D
                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                  • _free.LIBCMT ref: 00449609
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                  • String ID:
                  • API String ID: 1286116820-0
                  • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                  • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                  • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                  • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                  APIs
                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                  • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                    • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                    • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                  • String ID:
                  • API String ID: 2180151492-0
                  • Opcode ID: f543a937552f8da93e04a19db783a22fe456a5d43be0b6fbf0d05b22cfeed181
                  • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                  • Opcode Fuzzy Hash: f543a937552f8da93e04a19db783a22fe456a5d43be0b6fbf0d05b22cfeed181
                  • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free
                  • String ID:
                  • API String ID: 269201875-0
                  • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                  • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                  • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                  • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                  • __alloca_probe_16.LIBCMT ref: 00451231
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                  • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                  • __freea.LIBCMT ref: 0045129D
                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                  • String ID:
                  • API String ID: 313313983-0
                  • Opcode ID: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                  • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                  • Opcode Fuzzy Hash: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                  • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                  APIs
                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                  • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                  • waveInStart.WINMM ref: 00401CFE
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                  • String ID:
                  • API String ID: 1356121797-0
                  • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                  • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                  • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                  • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                    • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                  • _free.LIBCMT ref: 100071B8
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                  • String ID:
                  • API String ID: 336800556-0
                  • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                  • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                  • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                  • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                  • _free.LIBCMT ref: 0044F43F
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                  • String ID:
                  • API String ID: 336800556-0
                  • Opcode ID: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                  • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                  • Opcode Fuzzy Hash: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                  • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                  APIs
                  • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                  • _free.LIBCMT ref: 10005BB4
                  • _free.LIBCMT ref: 10005BDB
                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: ErrorLast$_free
                  • String ID:
                  • API String ID: 3170660625-0
                  • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                  • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                  • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                  • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                  APIs
                  • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                  • _free.LIBCMT ref: 00448353
                  • _free.LIBCMT ref: 0044837A
                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$_free
                  • String ID:
                  • API String ID: 3170660625-0
                  • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                  • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                  • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                  • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                  APIs
                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                  • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CloseHandleOpen$FileImageName
                  • String ID:
                  • API String ID: 2951400881-0
                  • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                  • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                  • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                  • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                  APIs
                  • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                  • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                  • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                  • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                  • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: lstrlen$lstrcat
                  • String ID:
                  • API String ID: 493641738-0
                  • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                  • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                  • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                  • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                  APIs
                  • _free.LIBCMT ref: 100091D0
                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                  • _free.LIBCMT ref: 100091E2
                  • _free.LIBCMT ref: 100091F4
                  • _free.LIBCMT ref: 10009206
                  • _free.LIBCMT ref: 10009218
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                  • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                  • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                  • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                  APIs
                  • _free.LIBCMT ref: 00450A54
                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                  • _free.LIBCMT ref: 00450A66
                  • _free.LIBCMT ref: 00450A78
                  • _free.LIBCMT ref: 00450A8A
                  • _free.LIBCMT ref: 00450A9C
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                  • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                  • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                  • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                  APIs
                  • _free.LIBCMT ref: 1000536F
                    • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                    • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                  • _free.LIBCMT ref: 10005381
                  • _free.LIBCMT ref: 10005394
                  • _free.LIBCMT ref: 100053A5
                  • _free.LIBCMT ref: 100053B6
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                  • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                  • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                  • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                  APIs
                  • _free.LIBCMT ref: 00444106
                    • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                  • _free.LIBCMT ref: 00444118
                  • _free.LIBCMT ref: 0044412B
                  • _free.LIBCMT ref: 0044413C
                  • _free.LIBCMT ref: 0044414D
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                  • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                  • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                  • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                  APIs
                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Enum$InfoQueryValue
                  • String ID: [regsplt]
                  • API String ID: 3554306468-4262303796
                  • Opcode ID: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                  • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                  • Opcode Fuzzy Hash: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                  • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                  APIs
                  • _strpbrk.LIBCMT ref: 0044E7B8
                  • _free.LIBCMT ref: 0044E8D5
                    • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                    • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                    • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                  • String ID: *?$.
                  • API String ID: 2812119850-3972193922
                  • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                  • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                  • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                  • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                  APIs
                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\rYhL.exe,00000104), ref: 10004C1D
                  • _free.LIBCMT ref: 10004CE8
                  • _free.LIBCMT ref: 10004CF2
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _free$FileModuleName
                  • String ID: C:\Users\user\Desktop\rYhL.exe
                  • API String ID: 2506810119-419431659
                  • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                  • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                  • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                  • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                  APIs
                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\rYhL.exe,00000104), ref: 00443515
                  • _free.LIBCMT ref: 004435E0
                  • _free.LIBCMT ref: 004435EA
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free$FileModuleName
                  • String ID: C:\Users\user\Desktop\rYhL.exe
                  • API String ID: 2506810119-419431659
                  • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                  • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                  • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                  • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                  APIs
                    • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                  Strings
                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                  • User Data\Default\Network\Cookies, xrefs: 0040C63E
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExistsFilePath
                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                  • API String ID: 1174141254-1980882731
                  • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                  • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                  • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                  • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                  APIs
                    • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                  Strings
                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                  • User Data\Default\Network\Cookies, xrefs: 0040C70D
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExistsFilePath
                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                  • API String ID: 1174141254-1980882731
                  • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                  • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                  • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                  • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                  APIs
                  • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                  • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040A249
                  • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040A255
                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateThread$LocalTimewsprintf
                  • String ID: Offline Keylogger Started
                  • API String ID: 465354869-4114347211
                  • Opcode ID: d2c6c6b1c115abd6082bc8f8898abe3c453afa196391d6f5d8e81b2196ab674b
                  • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                  • Opcode Fuzzy Hash: d2c6c6b1c115abd6082bc8f8898abe3c453afa196391d6f5d8e81b2196ab674b
                  • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                  APIs
                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                  • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateThread$LocalTime$wsprintf
                  • String ID: Online Keylogger Started
                  • API String ID: 112202259-1258561607
                  • Opcode ID: f3d6b4abe48f6a11fbf35fca459408289a3e67c664991f394f7c553c248ea070
                  • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                  • Opcode Fuzzy Hash: f3d6b4abe48f6a11fbf35fca459408289a3e67c664991f394f7c553c248ea070
                  • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                  APIs
                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                  • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: CryptUnprotectData$crypt32
                  • API String ID: 2574300362-2380590389
                  • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                  • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                  • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                  • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                  APIs
                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                  • CloseHandle.KERNEL32(?), ref: 004051CA
                  • SetEvent.KERNEL32(?), ref: 004051D9
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseEventHandleObjectSingleWait
                  • String ID: Connection Timeout
                  • API String ID: 2055531096-499159329
                  • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                  • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                  • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                  • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                  APIs
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Exception@8Throw
                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                  • API String ID: 2005118841-1866435925
                  • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                  • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                  • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                  • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                  APIs
                  • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                  • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F85E,pth_unenc,004752D8), ref: 00413888
                  • RegCloseKey.ADVAPI32(004752D8,?,0040F85E,pth_unenc,004752D8), ref: 00413893
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateValue
                  • String ID: pth_unenc
                  • API String ID: 1818849710-4028850238
                  • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                  • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                  • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                  • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                  APIs
                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                  • String ID: bad locale name
                  • API String ID: 3628047217-1405518554
                  • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                  • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                  • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                  • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                  APIs
                  • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                  • ShowWindow.USER32(00000009), ref: 00416C9C
                  • SetForegroundWindow.USER32 ref: 00416CA8
                    • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                    • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                    • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                    • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                  • String ID: !D@
                  • API String ID: 186401046-604454484
                  • Opcode ID: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                  • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                  • Opcode Fuzzy Hash: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                  • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                  APIs
                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExecuteShell
                  • String ID: /C $cmd.exe$open
                  • API String ID: 587946157-3896048727
                  • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                  • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                  • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                  • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                  APIs
                  • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                  • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                  • TerminateThread.KERNEL32(0040A2A2,00000000,?,pth_unenc), ref: 0040B910
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: TerminateThread$HookUnhookWindows
                  • String ID: pth_unenc
                  • API String ID: 3123878439-4028850238
                  • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                  • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                  • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                  • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                  APIs
                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                  • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: GetCursorInfo$User32.dll
                  • API String ID: 1646373207-2714051624
                  • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                  • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                  • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                  • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                  APIs
                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                  • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: GetLastInputInfo$User32.dll
                  • API String ID: 2574300362-1519888992
                  • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                  • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                  • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                  • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: __alldvrm$_strrchr
                  • String ID:
                  • API String ID: 1036877536-0
                  • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                  • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                  • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                  • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _free
                  • String ID:
                  • API String ID: 269201875-0
                  • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                  • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                  • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                  • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                  • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                  • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                  • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                  • __freea.LIBCMT ref: 100087D5
                    • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                  • String ID:
                  • API String ID: 2652629310-0
                  • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                  • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                  • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                  • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                  APIs
                  Strings
                  • Cleared browsers logins and cookies., xrefs: 0040C130
                  • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Sleep
                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                  • API String ID: 3472027048-1236744412
                  • Opcode ID: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                  • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                  • Opcode Fuzzy Hash: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                  • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                  APIs
                  • EnumDisplayMonitors.USER32(00000000,00000000,0041960A,00000000), ref: 00419530
                  • EnumDisplayDevicesW.USER32(?), ref: 00419560
                  • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004195D5
                  • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195F2
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DisplayEnum$Devices$Monitors
                  • String ID:
                  • API String ID: 1432082543-0
                  • Opcode ID: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                  • Instruction ID: 2d7c1ce958f8de7f9ce17d43b909e87ea7509c435c2805f0bc90a8abde121c81
                  • Opcode Fuzzy Hash: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                  • Instruction Fuzzy Hash: 232180721083146BD221DF26DC89EABBBECEBD1754F00053FF45AD3190EB749A49C66A
                  APIs
                    • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                    • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                    • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                  • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                  • Sleep.KERNEL32(00000064), ref: 0040A638
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Window$SleepText$ForegroundLength
                  • String ID: [ $ ]
                  • API String ID: 3309952895-93608704
                  • Opcode ID: e3c1de537be80067876ef70e6a789dfde08fa912f151d6d6ce86b7d0ea258fd3
                  • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                  • Opcode Fuzzy Hash: e3c1de537be80067876ef70e6a789dfde08fa912f151d6d6ce86b7d0ea258fd3
                  • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: SystemTimes$Sleep__aulldiv
                  • String ID:
                  • API String ID: 188215759-0
                  • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                  • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                  • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                  • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                  • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                  • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                  • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                  • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                  • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                  • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                  APIs
                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                  • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                  • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseCreateHandleSizeSleep
                  • String ID:
                  • API String ID: 1958988193-0
                  • Opcode ID: 3b1a01b47bddebb3752f31eb226f8e532d480515b9e880c3ec3420bf47c2c25d
                  • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                  • Opcode Fuzzy Hash: 3b1a01b47bddebb3752f31eb226f8e532d480515b9e880c3ec3420bf47c2c25d
                  • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                  • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID:
                  • API String ID: 3177248105-0
                  • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                  • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                  • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                  • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                  • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID:
                  • API String ID: 3177248105-0
                  • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                  • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                  • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                  • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                  APIs
                  • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                    • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                  • _UnwindNestedFrames.LIBCMT ref: 00439911
                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                  • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                  • String ID:
                  • API String ID: 2633735394-0
                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                  • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                  • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                  APIs
                  • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                  • GetSystemMetrics.USER32(0000004D), ref: 00419431
                  • GetSystemMetrics.USER32(0000004E), ref: 00419437
                  • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: MetricsSystem
                  • String ID:
                  • API String ID: 4116985748-0
                  • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                  • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                  • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                  • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                  APIs
                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                    • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                  • String ID:
                  • API String ID: 1761009282-0
                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                  • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                  • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                  APIs
                  • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorHandling__start
                  • String ID: pow
                  • API String ID: 3213639722-2276729525
                  • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                  • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                  • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                  • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                  APIs
                  • _free.LIBCMT ref: 1000655C
                    • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                    • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                    • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                  • String ID: *?$.
                  • API String ID: 2667617558-3972193922
                  • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                  • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                  • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                  • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                  APIs
                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                    • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                    • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                  • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseEnumInfoOpenQuerysend
                  • String ID: NG
                  • API String ID: 3114080316-1651712548
                  • Opcode ID: 98ed44dc4caea9a8c226c7cdff5212121b7baccb751d051fcbcdd94b1bfdfefb
                  • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                  • Opcode Fuzzy Hash: 98ed44dc4caea9a8c226c7cdff5212121b7baccb751d051fcbcdd94b1bfdfefb
                  • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                  APIs
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                    • Part of subcall function 0041C516: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                  • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                  Strings
                  • /sort "Visit Time" /stext ", xrefs: 004040B2
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                  • String ID: /sort "Visit Time" /stext "
                  • API String ID: 368326130-1573945896
                  • Opcode ID: 72d71ca1ca92f56ac952f73673ea2402e26b1a6c877ca60da89600d4813981e8
                  • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                  • Opcode Fuzzy Hash: 72d71ca1ca92f56ac952f73673ea2402e26b1a6c877ca60da89600d4813981e8
                  • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                  APIs
                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                  • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                  • String ID: image/jpeg
                  • API String ID: 1291196975-3785015651
                  • Opcode ID: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                  • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                  • Opcode Fuzzy Hash: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                  • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                  APIs
                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                  • __Init_thread_footer.LIBCMT ref: 0040B7D2
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Init_thread_footer__onexit
                  • String ID: [End of clipboard]$[Text copied to clipboard]
                  • API String ID: 1881088180-3686566968
                  • Opcode ID: 0ad70d16419787131355c48921a2e9415c0e2ce86788bdce81e29916b0442688
                  • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                  • Opcode Fuzzy Hash: 0ad70d16419787131355c48921a2e9415c0e2ce86788bdce81e29916b0442688
                  • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                  APIs
                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ACP$OCP
                  • API String ID: 0-711371036
                  • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                  • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                  • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                  • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                  APIs
                  • _wcslen.LIBCMT ref: 00416330
                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                    • Part of subcall function 004138B2: RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                    • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: _wcslen$CloseCreateValue
                  • String ID: !D@$okmode
                  • API String ID: 3411444782-1942679189
                  • Opcode ID: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                  • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                  • Opcode Fuzzy Hash: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                  • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                  APIs
                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                  • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                  • String ID: image/png
                  • API String ID: 1291196975-2966254431
                  • Opcode ID: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                  • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                  • Opcode Fuzzy Hash: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                  • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                  APIs
                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                  Strings
                  • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: LocalTime
                  • String ID: KeepAlive | Enabled | Timeout:
                  • API String ID: 481472006-1507639952
                  • Opcode ID: f2468334df4898d6ef002f637467a9298724a05ae75baec3b5dadd2c5d5b47a3
                  • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                  • Opcode Fuzzy Hash: f2468334df4898d6ef002f637467a9298724a05ae75baec3b5dadd2c5d5b47a3
                  • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                  APIs
                  • Sleep.KERNEL32 ref: 0041667B
                  • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DownloadFileSleep
                  • String ID: !D@
                  • API String ID: 1931167962-604454484
                  • Opcode ID: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                  • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                  • Opcode Fuzzy Hash: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                  • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: _strlen
                  • String ID: : $Se.
                  • API String ID: 4218353326-4089948878
                  • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                  • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                  • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                  • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                  APIs
                  • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: LocalTime
                  • String ID: | $%02i:%02i:%02i:%03i
                  • API String ID: 481472006-2430845779
                  • Opcode ID: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                  • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                  • Opcode Fuzzy Hash: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                  • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                  APIs
                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                  • CloseHandle.KERNEL32(?), ref: 0040B0EF
                  • UnhookWindowsHookEx.USER32 ref: 0040B102
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                  • String ID: Online Keylogger Stopped
                  • API String ID: 1623830855-1496645233
                  • Opcode ID: af233fb170c3e7993f7e935a79561d089458a16838c3db048d5fa7cce78358a9
                  • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                  • Opcode Fuzzy Hash: af233fb170c3e7993f7e935a79561d089458a16838c3db048d5fa7cce78358a9
                  • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                  APIs
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                    • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4484777465.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000003.00000002.4484758078.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4484777465.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_10000000_rYhL.jbxd
                  Similarity
                  • API ID: Exception@8Throw$ExceptionRaise
                  • String ID: Unknown exception
                  • API String ID: 3476068407-410509341
                  • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                  • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                  • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                  • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                  APIs
                  • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: LocaleValid
                  • String ID: IsValidLocaleName$kKD
                  • API String ID: 1901932003-3269126172
                  • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                  • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                  • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                  • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                  APIs
                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExistsFilePath
                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                  • API String ID: 1174141254-4188645398
                  • Opcode ID: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                  • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                  • Opcode Fuzzy Hash: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                  • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                  APIs
                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExistsFilePath
                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                  • API String ID: 1174141254-2800177040
                  • Opcode ID: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                  • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                  • Opcode Fuzzy Hash: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                  • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                  APIs
                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExistsFilePath
                  • String ID: AppData$\Opera Software\Opera Stable\
                  • API String ID: 1174141254-1629609700
                  • Opcode ID: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                  • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                  • Opcode Fuzzy Hash: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                  • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                  APIs
                  • GetKeyState.USER32(00000011), ref: 0040B686
                    • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                    • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                    • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                    • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                    • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                  • String ID: [AltL]$[AltR]
                  • API String ID: 2738857842-2658077756
                  • Opcode ID: f508c8d0c28e71ac455fa2a77041b079ca691cd00d60daeee8bf3b3b3c4de222
                  • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                  • Opcode Fuzzy Hash: f508c8d0c28e71ac455fa2a77041b079ca691cd00d60daeee8bf3b3b3c4de222
                  • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                  APIs
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExecuteShell
                  • String ID: !D@$open
                  • API String ID: 587946157-1586967515
                  • Opcode ID: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                  • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                  • Opcode Fuzzy Hash: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                  • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                  APIs
                  • GetKeyState.USER32(00000012), ref: 0040B6E0
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: State
                  • String ID: [CtrlL]$[CtrlR]
                  • API String ID: 1649606143-2446555240
                  • Opcode ID: 1ad9dfb3c513a634c020206c6c5afe09b5350a38294d89605c778c55c0391829
                  • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                  • Opcode Fuzzy Hash: 1ad9dfb3c513a634c020206c6c5afe09b5350a38294d89605c778c55c0391829
                  • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                  APIs
                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                  • __Init_thread_footer.LIBCMT ref: 00410F64
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: Init_thread_footer__onexit
                  • String ID: ,kG$0kG
                  • API String ID: 1881088180-2015055088
                  • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                  • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                  • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                  • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                  APIs
                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A6C
                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                  Strings
                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DeleteOpenValue
                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                  • API String ID: 2654517830-1051519024
                  • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                  • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                  • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                  • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                  APIs
                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: DeleteDirectoryFileRemove
                  • String ID: pth_unenc
                  • API String ID: 3325800564-4028850238
                  • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                  • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                  • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                  • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                  APIs
                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                  • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ObjectProcessSingleTerminateWait
                  • String ID: pth_unenc
                  • API String ID: 1872346434-4028850238
                  • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                  • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                  • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                  • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountInfoInputLastTick
                  • String ID: NG
                  • API String ID: 3478931382-1651712548
                  • Opcode ID: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                  • Instruction ID: 91b37e9d9b7f8f393223e5bf0be67cbbeb1ccf95644ad96dbec1e326022f3834
                  • Opcode Fuzzy Hash: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                  • Instruction Fuzzy Hash: 84D0C97180060CABDB04AFA5EC4D99DBBBCEB05212F1042A5E84992210DA71AA548A95
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                  • GetLastError.KERNEL32 ref: 00440D85
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharMultiWide$ErrorLast
                  • String ID:
                  • API String ID: 1717984340-0
                  • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                  • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                  • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                  • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                  APIs
                  • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411F2B), ref: 00411BC7
                  • IsBadReadPtr.KERNEL32(?,00000014,00411F2B), ref: 00411C93
                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                  • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                  Memory Dump Source
                  • Source File: 00000003.00000002.4483663867.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000003.00000002.4483663867.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.4483663867.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_rYhL.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLastRead
                  • String ID:
                  • API String ID: 4100373531-0
                  • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                  • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                  • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                  • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                  Execution Graph

                  Execution Coverage:6.5%
                  Dynamic/Decrypted Code Coverage:9.2%
                  Signature Coverage:0%
                  Total number of Nodes:2000
                  Total number of Limit Nodes:87
                  execution_graph 40419 441819 40422 430737 40419->40422 40421 441825 40423 430756 40422->40423 40435 43076d 40422->40435 40424 430774 40423->40424 40425 43075f 40423->40425 40436 43034a 40424->40436 40447 4169a7 11 API calls 40425->40447 40428 4307ce 40429 430819 memset 40428->40429 40440 415b2c 40428->40440 40429->40435 40430 43077e 40430->40428 40433 4307fa 40430->40433 40430->40435 40432 4307e9 40432->40429 40432->40435 40448 4169a7 11 API calls 40433->40448 40435->40421 40437 430359 40436->40437 40438 43034e 40436->40438 40437->40430 40449 415c23 memcpy 40438->40449 40441 415b42 40440->40441 40446 415b46 40440->40446 40442 415b94 40441->40442 40444 415b5a 40441->40444 40441->40446 40443 4438b5 10 API calls 40442->40443 40443->40446 40445 415b79 memcpy 40444->40445 40444->40446 40445->40446 40446->40432 40447->40435 40448->40435 40449->40437 37676 442ec6 19 API calls 37850 4152c6 malloc 37851 4152e2 37850->37851 37852 4152ef 37850->37852 37854 416760 11 API calls 37852->37854 37854->37851 37855 4466f4 37874 446904 37855->37874 37857 446700 GetModuleHandleA 37860 446710 __set_app_type __p__fmode __p__commode 37857->37860 37859 4467a4 37861 4467ac __setusermatherr 37859->37861 37862 4467b8 37859->37862 37860->37859 37861->37862 37875 4468f0 _controlfp 37862->37875 37864 4467bd _initterm __wgetmainargs _initterm 37865 44681e GetStartupInfoW 37864->37865 37866 446810 37864->37866 37868 446866 GetModuleHandleA 37865->37868 37876 41276d 37868->37876 37872 446896 exit 37873 44689d _cexit 37872->37873 37873->37866 37874->37857 37875->37864 37877 41277d 37876->37877 37919 4044a4 LoadLibraryW 37877->37919 37879 412785 37911 412789 37879->37911 37927 414b81 37879->37927 37882 4127c8 37933 412465 memset ??2@YAPAXI 37882->37933 37884 4127ea 37945 40ac21 37884->37945 37889 412813 37963 40dd07 memset 37889->37963 37890 412827 37968 40db69 memset 37890->37968 37893 412822 37989 4125b6 ??3@YAXPAX 37893->37989 37895 40ada2 _wcsicmp 37896 41283d 37895->37896 37896->37893 37899 412863 CoInitialize 37896->37899 37973 41268e 37896->37973 37993 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37899->37993 37901 41296f 37995 40b633 37901->37995 37906 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37910 412957 37906->37910 37916 4128ca 37906->37916 37910->37893 37911->37872 37911->37873 37912 4128d0 TranslateAcceleratorW 37913 412941 GetMessageW 37912->37913 37912->37916 37913->37910 37913->37912 37914 412909 IsDialogMessageW 37914->37913 37914->37916 37915 4128fd IsDialogMessageW 37915->37913 37915->37914 37916->37912 37916->37914 37916->37915 37917 41292b TranslateMessage DispatchMessageW 37916->37917 37918 41291f IsDialogMessageW 37916->37918 37917->37913 37918->37913 37918->37917 37920 4044cf GetProcAddress 37919->37920 37923 4044f7 37919->37923 37921 4044e8 FreeLibrary 37920->37921 37924 4044df 37920->37924 37922 4044f3 37921->37922 37921->37923 37922->37923 37925 404507 MessageBoxW 37923->37925 37926 40451e 37923->37926 37924->37921 37925->37879 37926->37879 37928 414b8a 37927->37928 37929 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37927->37929 37999 40a804 memset 37928->37999 37929->37882 37932 414b9e GetProcAddress 37932->37929 37934 4124e0 37933->37934 37935 412505 ??2@YAPAXI 37934->37935 37936 41251c 37935->37936 37938 412521 37935->37938 38021 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37936->38021 38010 444722 37938->38010 37944 41259b wcscpy 37944->37884 38026 40b1ab ??3@YAXPAX ??3@YAXPAX 37945->38026 37949 40ad4b 37958 40ad76 37949->37958 38050 40a9ce 37949->38050 37950 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37952 40ac5c 37950->37952 37952->37949 37952->37950 37953 40ace7 ??3@YAXPAX 37952->37953 37952->37958 38030 40a8d0 37952->38030 38042 4099f4 37952->38042 37953->37952 37957 40a8d0 7 API calls 37957->37958 38027 40aa04 37958->38027 37959 40ada2 37960 40adc9 37959->37960 37961 40adaa 37959->37961 37960->37889 37960->37890 37961->37960 37962 40adb3 _wcsicmp 37961->37962 37962->37960 37962->37961 38055 40dce0 37963->38055 37965 40dd3a GetModuleHandleW 38060 40dba7 37965->38060 37969 40dce0 3 API calls 37968->37969 37970 40db99 37969->37970 38132 40dae1 37970->38132 38146 402f3a 37973->38146 37975 412766 37975->37893 37975->37899 37976 4126d3 _wcsicmp 37977 4126a8 37976->37977 37977->37975 37977->37976 37979 41270a 37977->37979 38180 4125f8 7 API calls 37977->38180 37979->37975 38149 411ac5 37979->38149 37990 4125da 37989->37990 37991 4125f0 37990->37991 37992 4125e6 DeleteObject 37990->37992 37994 40b1ab ??3@YAXPAX ??3@YAXPAX 37991->37994 37992->37991 37993->37906 37994->37901 37996 40b640 37995->37996 37997 40b639 ??3@YAXPAX 37995->37997 37998 40b1ab ??3@YAXPAX ??3@YAXPAX 37996->37998 37997->37996 37998->37911 38000 40a83b GetSystemDirectoryW 37999->38000 38001 40a84c wcscpy 37999->38001 38000->38001 38006 409719 wcslen 38001->38006 38004 40a881 LoadLibraryW 38005 40a886 38004->38005 38005->37929 38005->37932 38007 409724 38006->38007 38008 409739 wcscat LoadLibraryW 38006->38008 38007->38008 38009 40972c wcscat 38007->38009 38008->38004 38008->38005 38009->38008 38011 444732 38010->38011 38012 444728 DeleteObject 38010->38012 38022 409cc3 38011->38022 38012->38011 38014 412551 38015 4010f9 38014->38015 38016 401130 38015->38016 38017 401134 GetModuleHandleW LoadIconW 38016->38017 38018 401107 wcsncat 38016->38018 38019 40a7be 38017->38019 38018->38016 38020 40a7d2 38019->38020 38020->37944 38020->38020 38021->37938 38025 409bfd memset wcscpy 38022->38025 38024 409cdb CreateFontIndirectW 38024->38014 38025->38024 38026->37952 38028 40aa14 38027->38028 38029 40aa0a ??3@YAXPAX 38027->38029 38028->37959 38029->38028 38031 40a8eb 38030->38031 38032 40a8df wcslen 38030->38032 38033 40a906 ??3@YAXPAX 38031->38033 38034 40a90f 38031->38034 38032->38031 38038 40a919 38033->38038 38035 4099f4 3 API calls 38034->38035 38035->38038 38036 40a932 38040 4099f4 3 API calls 38036->38040 38037 40a929 ??3@YAXPAX 38039 40a93e memcpy 38037->38039 38038->38036 38038->38037 38039->37952 38041 40a93d 38040->38041 38041->38039 38043 409a41 38042->38043 38044 4099fb malloc 38042->38044 38043->37952 38046 409a37 38044->38046 38047 409a1c 38044->38047 38046->37952 38048 409a30 ??3@YAXPAX 38047->38048 38049 409a20 memcpy 38047->38049 38048->38046 38049->38048 38051 40a9e7 38050->38051 38052 40a9dc ??3@YAXPAX 38050->38052 38054 4099f4 3 API calls 38051->38054 38053 40a9f2 38052->38053 38053->37957 38054->38053 38079 409bca GetModuleFileNameW 38055->38079 38057 40dce6 wcsrchr 38058 40dcf5 38057->38058 38059 40dcf9 wcscat 38057->38059 38058->38059 38059->37965 38080 44db70 38060->38080 38064 40dbfd 38083 4447d9 38064->38083 38067 40dc34 wcscpy wcscpy 38109 40d6f5 38067->38109 38068 40dc1f wcscpy 38068->38067 38071 40d6f5 3 API calls 38072 40dc73 38071->38072 38073 40d6f5 3 API calls 38072->38073 38074 40dc89 38073->38074 38075 40d6f5 3 API calls 38074->38075 38076 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38075->38076 38115 40da80 38076->38115 38079->38057 38081 40dbb4 memset memset 38080->38081 38082 409bca GetModuleFileNameW 38081->38082 38082->38064 38085 4447f4 38083->38085 38084 40dc1b 38084->38067 38084->38068 38085->38084 38086 444807 ??2@YAPAXI 38085->38086 38087 44481f 38086->38087 38088 444873 _snwprintf 38087->38088 38089 4448ab wcscpy 38087->38089 38122 44474a 8 API calls 38088->38122 38091 4448bb 38089->38091 38123 44474a 8 API calls 38091->38123 38093 4448a7 38093->38089 38093->38091 38094 4448cd 38124 44474a 8 API calls 38094->38124 38096 4448e2 38125 44474a 8 API calls 38096->38125 38098 4448f7 38126 44474a 8 API calls 38098->38126 38100 44490c 38127 44474a 8 API calls 38100->38127 38102 444921 38128 44474a 8 API calls 38102->38128 38104 444936 38129 44474a 8 API calls 38104->38129 38106 44494b 38130 44474a 8 API calls 38106->38130 38108 444960 ??3@YAXPAX 38108->38084 38110 44db70 38109->38110 38111 40d702 memset GetPrivateProfileStringW 38110->38111 38112 40d752 38111->38112 38113 40d75c WritePrivateProfileStringW 38111->38113 38112->38113 38114 40d758 38112->38114 38113->38114 38114->38071 38116 44db70 38115->38116 38117 40da8d memset 38116->38117 38118 40daac LoadStringW 38117->38118 38119 40dac6 38118->38119 38119->38118 38121 40dade 38119->38121 38131 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38119->38131 38121->37893 38122->38093 38123->38094 38124->38096 38125->38098 38126->38100 38127->38102 38128->38104 38129->38106 38130->38108 38131->38119 38142 409b98 GetFileAttributesW 38132->38142 38134 40daea 38135 40db63 38134->38135 38136 40daef wcscpy wcscpy GetPrivateProfileIntW 38134->38136 38135->37895 38143 40d65d GetPrivateProfileStringW 38136->38143 38138 40db3e 38144 40d65d GetPrivateProfileStringW 38138->38144 38140 40db4f 38145 40d65d GetPrivateProfileStringW 38140->38145 38142->38134 38143->38138 38144->38140 38145->38135 38181 40eaff 38146->38181 38150 411ae2 memset 38149->38150 38151 411b8f 38149->38151 38221 409bca GetModuleFileNameW 38150->38221 38163 411a8b 38151->38163 38153 411b0a wcsrchr 38154 411b22 wcscat 38153->38154 38155 411b1f 38153->38155 38222 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38154->38222 38155->38154 38157 411b67 38223 402afb 38157->38223 38161 411b7f 38279 40ea13 SendMessageW memset SendMessageW 38161->38279 38164 402afb 27 API calls 38163->38164 38165 411ac0 38164->38165 38166 4110dc 38165->38166 38167 41113e 38166->38167 38172 4110f0 38166->38172 38304 40969c LoadCursorW SetCursor 38167->38304 38169 411143 38305 4032b4 38169->38305 38323 444a54 38169->38323 38170 4110f7 _wcsicmp 38170->38172 38171 411157 38173 40ada2 _wcsicmp 38171->38173 38172->38167 38172->38170 38326 410c46 10 API calls 38172->38326 38176 411167 38173->38176 38174 4111af 38176->38174 38177 4111a6 qsort 38176->38177 38177->38174 38180->37977 38182 40eb10 38181->38182 38194 40e8e0 38182->38194 38185 40eb6c memcpy memcpy 38186 40ebb7 38185->38186 38186->38185 38187 40ebf2 ??2@YAPAXI ??2@YAPAXI 38186->38187 38188 40d134 16 API calls 38186->38188 38189 40ec2e ??2@YAPAXI 38187->38189 38191 40ec65 38187->38191 38188->38186 38189->38191 38191->38191 38204 40ea7f 38191->38204 38193 402f49 38193->37977 38195 40e8f2 38194->38195 38196 40e8eb ??3@YAXPAX 38194->38196 38197 40e900 38195->38197 38198 40e8f9 ??3@YAXPAX 38195->38198 38196->38195 38199 40e911 38197->38199 38200 40e90a ??3@YAXPAX 38197->38200 38198->38197 38201 40e931 ??2@YAPAXI ??2@YAPAXI 38199->38201 38202 40e921 ??3@YAXPAX 38199->38202 38203 40e92a ??3@YAXPAX 38199->38203 38200->38199 38201->38185 38202->38203 38203->38201 38205 40aa04 ??3@YAXPAX 38204->38205 38206 40ea88 38205->38206 38207 40aa04 ??3@YAXPAX 38206->38207 38208 40ea90 38207->38208 38209 40aa04 ??3@YAXPAX 38208->38209 38210 40ea98 38209->38210 38211 40aa04 ??3@YAXPAX 38210->38211 38212 40eaa0 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eab3 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eabd 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40eac7 38217->38218 38219 40a9ce 4 API calls 38218->38219 38220 40ead1 38219->38220 38220->38193 38221->38153 38222->38157 38280 40b2cc 38223->38280 38225 402b0a 38226 40b2cc 27 API calls 38225->38226 38227 402b23 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b3a 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b54 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b6b 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b82 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402b99 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bb0 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bc7 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bde 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402bf5 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c0c 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c23 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c3a 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c51 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c68 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c7f 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402c99 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cb3 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cd5 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402cf0 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d0b 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d26 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d3e 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d59 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d78 38274->38275 38276 40b2cc 27 API calls 38275->38276 38277 402d93 38276->38277 38278 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38277->38278 38278->38161 38279->38151 38283 40b58d 38280->38283 38282 40b2d1 38282->38225 38284 40b5a4 GetModuleHandleW FindResourceW 38283->38284 38285 40b62e 38283->38285 38286 40b5c2 LoadResource 38284->38286 38287 40b5e7 38284->38287 38285->38282 38286->38287 38288 40b5d0 SizeofResource LockResource 38286->38288 38287->38285 38296 40afcf 38287->38296 38288->38287 38290 40b608 memcpy 38299 40b4d3 memcpy 38290->38299 38292 40b61e 38300 40b3c1 18 API calls 38292->38300 38294 40b626 38301 40b04b 38294->38301 38297 40b04b ??3@YAXPAX 38296->38297 38298 40afd7 ??2@YAPAXI 38297->38298 38298->38290 38299->38292 38300->38294 38302 40b051 ??3@YAXPAX 38301->38302 38303 40b05f 38301->38303 38302->38303 38303->38285 38304->38169 38306 4032c4 38305->38306 38307 40b633 ??3@YAXPAX 38306->38307 38308 403316 38307->38308 38327 44553b 38308->38327 38312 403480 38523 40368c 15 API calls 38312->38523 38314 403489 38315 40b633 ??3@YAXPAX 38314->38315 38316 403495 38315->38316 38316->38171 38317 4033a9 memset memcpy 38318 4033ec wcscmp 38317->38318 38319 40333c 38317->38319 38318->38319 38319->38312 38319->38317 38319->38318 38521 4028e7 11 API calls 38319->38521 38522 40f508 6 API calls 38319->38522 38321 403421 _wcsicmp 38321->38319 38324 444a64 FreeLibrary 38323->38324 38325 444a83 38323->38325 38324->38325 38325->38171 38326->38172 38328 445548 38327->38328 38329 445599 38328->38329 38524 40c768 38328->38524 38330 4455a8 memset 38329->38330 38336 4457f2 38329->38336 38607 403988 38330->38607 38339 445854 38336->38339 38709 403e2d memset memset memset memset memset 38336->38709 38390 4458aa 38339->38390 38732 403c9c memset memset memset memset memset 38339->38732 38340 445672 38618 403fbe memset memset memset memset memset 38340->38618 38341 4458bb memset memset 38343 414c2e 16 API calls 38341->38343 38342 4455e5 38342->38340 38352 44560f 38342->38352 38346 4458f9 38343->38346 38345 44595e memset memset 38350 414c2e 16 API calls 38345->38350 38351 40b2cc 27 API calls 38346->38351 38348 445a00 memset memset 38755 414c2e 38348->38755 38349 445b22 38355 445bca 38349->38355 38356 445b38 memset memset memset 38349->38356 38360 44599c 38350->38360 38361 445909 38351->38361 38363 4087b3 338 API calls 38352->38363 38353 44557a 38387 44558c 38353->38387 38804 41366b FreeLibrary 38353->38804 38354 445849 38819 40b1ab ??3@YAXPAX ??3@YAXPAX 38354->38819 38362 445c8b memset memset 38355->38362 38429 445cf0 38355->38429 38365 445bd4 38356->38365 38366 445b98 38356->38366 38369 40b2cc 27 API calls 38360->38369 38371 409d1f 6 API calls 38361->38371 38374 414c2e 16 API calls 38362->38374 38372 445621 38363->38372 38364 44589f 38820 40b1ab ??3@YAXPAX ??3@YAXPAX 38364->38820 38380 414c2e 16 API calls 38365->38380 38366->38365 38376 445ba2 38366->38376 38373 4459ac 38369->38373 38370 403335 38520 4452e5 45 API calls 38370->38520 38383 445919 38371->38383 38805 4454bf 20 API calls 38372->38805 38385 409d1f 6 API calls 38373->38385 38386 445cc9 38374->38386 38892 4099c6 wcslen 38376->38892 38377 4456b2 38807 40b1ab ??3@YAXPAX ??3@YAXPAX 38377->38807 38379 40b2cc 27 API calls 38391 445a4f 38379->38391 38393 445be2 38380->38393 38381 445d3d 38414 40b2cc 27 API calls 38381->38414 38382 445d88 memset memset memset 38397 414c2e 16 API calls 38382->38397 38821 409b98 GetFileAttributesW 38383->38821 38384 445823 38384->38354 38396 4087b3 338 API calls 38384->38396 38398 4459bc 38385->38398 38399 409d1f 6 API calls 38386->38399 38591 444b06 38387->38591 38388 445879 38388->38364 38409 4087b3 338 API calls 38388->38409 38390->38341 38415 44594a 38390->38415 38770 409d1f wcslen wcslen 38391->38770 38394 40b2cc 27 API calls 38393->38394 38403 445bf3 38394->38403 38396->38384 38406 445dde 38397->38406 38888 409b98 GetFileAttributesW 38398->38888 38408 445ce1 38399->38408 38400 445bb3 38895 445403 memset 38400->38895 38401 445680 38401->38377 38641 4087b3 memset 38401->38641 38413 409d1f 6 API calls 38403->38413 38404 445928 38404->38415 38822 40b6ef 38404->38822 38416 40b2cc 27 API calls 38406->38416 38912 409b98 GetFileAttributesW 38408->38912 38409->38388 38412 40b2cc 27 API calls 38421 445a94 38412->38421 38423 445c07 38413->38423 38424 445d54 _wcsicmp 38414->38424 38415->38345 38428 4459ed 38415->38428 38427 445def 38416->38427 38417 4459cb 38417->38428 38437 40b6ef 252 API calls 38417->38437 38775 40ae18 38421->38775 38422 44566d 38422->38336 38692 413d4c 38422->38692 38433 445389 258 API calls 38423->38433 38434 445d71 38424->38434 38499 445d67 38424->38499 38426 445665 38806 40b1ab ??3@YAXPAX ??3@YAXPAX 38426->38806 38435 409d1f 6 API calls 38427->38435 38428->38348 38428->38349 38429->38370 38429->38381 38429->38382 38430 445389 258 API calls 38430->38355 38439 445c17 38433->38439 38913 445093 23 API calls 38434->38913 38442 445e03 38435->38442 38437->38428 38438 4456d8 38444 40b2cc 27 API calls 38438->38444 38445 40b2cc 27 API calls 38439->38445 38441 44563c 38441->38426 38447 4087b3 338 API calls 38441->38447 38914 409b98 GetFileAttributesW 38442->38914 38443 40b6ef 252 API calls 38443->38370 38449 4456e2 38444->38449 38450 445c23 38445->38450 38446 445d83 38446->38370 38447->38441 38808 413fa6 _wcsicmp _wcsicmp 38449->38808 38454 409d1f 6 API calls 38450->38454 38452 445e12 38459 445e6b 38452->38459 38465 40b2cc 27 API calls 38452->38465 38457 445c37 38454->38457 38455 445aa1 38458 445b17 38455->38458 38473 445ab2 memset 38455->38473 38486 409d1f 6 API calls 38455->38486 38782 40add4 38455->38782 38787 445389 38455->38787 38796 40ae51 38455->38796 38456 4456eb 38461 4456fd memset memset memset memset 38456->38461 38462 4457ea 38456->38462 38463 445389 258 API calls 38457->38463 38889 40aebe 38458->38889 38916 445093 23 API calls 38459->38916 38809 409c70 wcscpy wcsrchr 38461->38809 38812 413d29 38462->38812 38469 445c47 38463->38469 38470 445e33 38465->38470 38467 445e7e 38472 445f67 38467->38472 38475 40b2cc 27 API calls 38469->38475 38476 409d1f 6 API calls 38470->38476 38481 40b2cc 27 API calls 38472->38481 38477 40b2cc 27 API calls 38473->38477 38479 445c53 38475->38479 38480 445e47 38476->38480 38477->38455 38478 409c70 2 API calls 38482 44577e 38478->38482 38483 409d1f 6 API calls 38479->38483 38915 409b98 GetFileAttributesW 38480->38915 38485 445f73 38481->38485 38487 409c70 2 API calls 38482->38487 38488 445c67 38483->38488 38490 409d1f 6 API calls 38485->38490 38486->38455 38491 44578d 38487->38491 38492 445389 258 API calls 38488->38492 38489 445e56 38489->38459 38495 445e83 memset 38489->38495 38493 445f87 38490->38493 38491->38462 38498 40b2cc 27 API calls 38491->38498 38492->38355 38919 409b98 GetFileAttributesW 38493->38919 38497 40b2cc 27 API calls 38495->38497 38500 445eab 38497->38500 38501 4457a8 38498->38501 38499->38370 38499->38443 38502 409d1f 6 API calls 38500->38502 38503 409d1f 6 API calls 38501->38503 38504 445ebf 38502->38504 38505 4457b8 38503->38505 38506 40ae18 9 API calls 38504->38506 38811 409b98 GetFileAttributesW 38505->38811 38516 445ef5 38506->38516 38508 4457c7 38508->38462 38510 4087b3 338 API calls 38508->38510 38509 40ae51 9 API calls 38509->38516 38510->38462 38511 445f5c 38513 40aebe FindClose 38511->38513 38512 40add4 2 API calls 38512->38516 38513->38472 38514 40b2cc 27 API calls 38514->38516 38515 409d1f 6 API calls 38515->38516 38516->38509 38516->38511 38516->38512 38516->38514 38516->38515 38518 445f3a 38516->38518 38917 409b98 GetFileAttributesW 38516->38917 38918 445093 23 API calls 38518->38918 38520->38319 38521->38321 38522->38319 38523->38314 38525 40c775 38524->38525 38920 40b1ab ??3@YAXPAX ??3@YAXPAX 38525->38920 38527 40c788 38921 40b1ab ??3@YAXPAX ??3@YAXPAX 38527->38921 38529 40c790 38922 40b1ab ??3@YAXPAX ??3@YAXPAX 38529->38922 38531 40c798 38532 40aa04 ??3@YAXPAX 38531->38532 38533 40c7a0 38532->38533 38923 40c274 memset 38533->38923 38538 40a8ab 9 API calls 38539 40c7c3 38538->38539 38540 40a8ab 9 API calls 38539->38540 38541 40c7d0 38540->38541 38952 40c3c3 38541->38952 38545 40c7e5 38546 40c877 38545->38546 38547 40c86c 38545->38547 38553 40c634 49 API calls 38545->38553 38977 40a706 38545->38977 38554 40bdb0 38546->38554 38994 4053fe 39 API calls 38547->38994 38553->38545 39184 404363 38554->39184 38557 40bf5d 39204 40440c 38557->39204 38559 40bdee 38559->38557 38562 40b2cc 27 API calls 38559->38562 38560 40bddf CredEnumerateW 38560->38559 38563 40be02 wcslen 38562->38563 38563->38557 38565 40be1e 38563->38565 38564 40be26 _wcsncoll 38564->38565 38565->38557 38565->38564 38568 40be7d memset 38565->38568 38569 40bea7 memcpy 38565->38569 38570 40bf11 wcschr 38565->38570 38571 40b2cc 27 API calls 38565->38571 38573 40bf43 LocalFree 38565->38573 39207 40bd5d 28 API calls 38565->39207 39208 404423 38565->39208 38568->38565 38568->38569 38569->38565 38569->38570 38570->38565 38572 40bef6 _wcsnicmp 38571->38572 38572->38565 38572->38570 38573->38565 38574 4135f7 39221 4135e0 38574->39221 38577 40b2cc 27 API calls 38578 41360d 38577->38578 38579 40a804 8 API calls 38578->38579 38580 413613 38579->38580 38581 41361b 38580->38581 38582 41363e 38580->38582 38583 40b273 27 API calls 38581->38583 38584 4135e0 FreeLibrary 38582->38584 38585 413625 GetProcAddress 38583->38585 38586 413643 38584->38586 38585->38582 38587 413648 38585->38587 38586->38353 38588 413658 38587->38588 38589 4135e0 FreeLibrary 38587->38589 38588->38353 38590 413666 38589->38590 38590->38353 39224 4449b9 38591->39224 38594 444c1f 38594->38329 38595 4449b9 42 API calls 38597 444b4b 38595->38597 38596 444c15 38599 4449b9 42 API calls 38596->38599 38597->38596 39245 444972 GetVersionExW 38597->39245 38599->38594 38600 444b99 memcmp 38605 444b8c 38600->38605 38601 444c0b 39249 444a85 42 API calls 38601->39249 38605->38600 38605->38601 39246 444aa5 42 API calls 38605->39246 39247 40a7a0 GetVersionExW 38605->39247 39248 444a85 42 API calls 38605->39248 38608 40399d 38607->38608 39250 403a16 38608->39250 38610 403a09 39264 40b1ab ??3@YAXPAX ??3@YAXPAX 38610->39264 38612 403a12 wcsrchr 38612->38342 38613 4039a3 38613->38610 38616 4039f4 38613->38616 39261 40a02c CreateFileW 38613->39261 38616->38610 38617 4099c6 2 API calls 38616->38617 38617->38610 38619 414c2e 16 API calls 38618->38619 38620 404048 38619->38620 38621 414c2e 16 API calls 38620->38621 38622 404056 38621->38622 38623 409d1f 6 API calls 38622->38623 38624 404073 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 40408e 38625->38626 38627 409d1f 6 API calls 38626->38627 38628 4040a6 38627->38628 38629 403af5 20 API calls 38628->38629 38630 4040ba 38629->38630 38631 403af5 20 API calls 38630->38631 38632 4040cb 38631->38632 39291 40414f memset 38632->39291 38634 404140 39305 40b1ab ??3@YAXPAX ??3@YAXPAX 38634->39305 38636 4040ec memset 38639 4040e0 38636->38639 38637 404148 38637->38401 38638 4099c6 2 API calls 38638->38639 38639->38634 38639->38636 38639->38638 38640 40a8ab 9 API calls 38639->38640 38640->38639 39318 40a6e6 WideCharToMultiByte 38641->39318 38643 4087ed 39319 4095d9 memset 38643->39319 38646 408953 38646->38401 38647 408809 memset memset memset memset memset 38648 40b2cc 27 API calls 38647->38648 38649 4088a1 38648->38649 38650 409d1f 6 API calls 38649->38650 38651 4088b1 38650->38651 38652 40b2cc 27 API calls 38651->38652 38653 4088c0 38652->38653 38654 409d1f 6 API calls 38653->38654 38655 4088d0 38654->38655 38656 40b2cc 27 API calls 38655->38656 38657 4088df 38656->38657 38658 409d1f 6 API calls 38657->38658 38659 4088ef 38658->38659 38660 40b2cc 27 API calls 38659->38660 38661 4088fe 38660->38661 38662 409d1f 6 API calls 38661->38662 38663 40890e 38662->38663 38664 40b2cc 27 API calls 38663->38664 38665 40891d 38664->38665 38666 409d1f 6 API calls 38665->38666 38667 40892d 38666->38667 38693 40b633 ??3@YAXPAX 38692->38693 38694 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38693->38694 38695 413f00 Process32NextW 38694->38695 38696 413da5 OpenProcess 38695->38696 38697 413f17 CloseHandle 38695->38697 38698 413df3 memset 38696->38698 38702 413eb0 38696->38702 38697->38438 39640 413f27 38698->39640 38700 413ebf ??3@YAXPAX 38700->38702 38701 4099f4 3 API calls 38701->38702 38702->38695 38702->38700 38702->38701 38704 413e37 GetModuleHandleW 38705 413e46 GetProcAddress 38704->38705 38706 413e1f 38704->38706 38705->38706 38706->38704 39645 413959 38706->39645 39661 413ca4 38706->39661 38708 413ea2 CloseHandle 38708->38702 38710 414c2e 16 API calls 38709->38710 38711 403eb7 38710->38711 38712 414c2e 16 API calls 38711->38712 38713 403ec5 38712->38713 38714 409d1f 6 API calls 38713->38714 38715 403ee2 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403efd 38716->38717 38718 409d1f 6 API calls 38717->38718 38719 403f15 38718->38719 38720 403af5 20 API calls 38719->38720 38721 403f29 38720->38721 38722 403af5 20 API calls 38721->38722 38723 403f3a 38722->38723 38724 40414f 33 API calls 38723->38724 38725 403f4f 38724->38725 38726 403faf 38725->38726 38728 403f5b memset 38725->38728 38730 4099c6 2 API calls 38725->38730 38731 40a8ab 9 API calls 38725->38731 39675 40b1ab ??3@YAXPAX ??3@YAXPAX 38726->39675 38728->38725 38729 403fb7 38729->38384 38730->38725 38731->38725 38733 414c2e 16 API calls 38732->38733 38734 403d26 38733->38734 38735 414c2e 16 API calls 38734->38735 38736 403d34 38735->38736 38737 409d1f 6 API calls 38736->38737 38738 403d51 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d6c 38739->38740 38741 409d1f 6 API calls 38740->38741 38742 403d84 38741->38742 38743 403af5 20 API calls 38742->38743 38744 403d98 38743->38744 38745 403af5 20 API calls 38744->38745 38746 403da9 38745->38746 38747 40414f 33 API calls 38746->38747 38748 403dbe 38747->38748 38749 403e1e 38748->38749 38750 403dca memset 38748->38750 38753 4099c6 2 API calls 38748->38753 38754 40a8ab 9 API calls 38748->38754 39676 40b1ab ??3@YAXPAX ??3@YAXPAX 38749->39676 38750->38748 38752 403e26 38752->38388 38753->38748 38754->38748 38756 414b81 9 API calls 38755->38756 38757 414c40 38756->38757 38758 414c73 memset 38757->38758 39677 409cea 38757->39677 38760 414c94 38758->38760 39680 414592 RegOpenKeyExW 38760->39680 38762 414c64 38762->38379 38764 414cc1 38765 414cf4 wcscpy 38764->38765 39681 414bb0 wcscpy 38764->39681 38765->38762 38767 414cd2 39682 4145ac RegQueryValueExW 38767->39682 38769 414ce9 RegCloseKey 38769->38765 38771 409d62 38770->38771 38772 409d43 wcscpy 38770->38772 38771->38412 38773 409719 2 API calls 38772->38773 38774 409d51 wcscat 38773->38774 38774->38771 38776 40aebe FindClose 38775->38776 38777 40ae21 38776->38777 38778 4099c6 2 API calls 38777->38778 38779 40ae35 38778->38779 38780 409d1f 6 API calls 38779->38780 38781 40ae49 38780->38781 38781->38455 38783 40ade0 38782->38783 38784 40ae0f 38782->38784 38783->38784 38785 40ade7 wcscmp 38783->38785 38784->38455 38785->38784 38786 40adfe wcscmp 38785->38786 38786->38784 38788 40ae18 9 API calls 38787->38788 38794 4453c4 38788->38794 38789 40ae51 9 API calls 38789->38794 38790 4453f3 38792 40aebe FindClose 38790->38792 38791 40add4 2 API calls 38791->38794 38793 4453fe 38792->38793 38793->38455 38794->38789 38794->38790 38794->38791 38795 445403 253 API calls 38794->38795 38795->38794 38797 40ae7b FindNextFileW 38796->38797 38798 40ae5c FindFirstFileW 38796->38798 38799 40ae94 38797->38799 38800 40ae8f 38797->38800 38798->38799 38802 40aeb6 38799->38802 38803 409d1f 6 API calls 38799->38803 38801 40aebe FindClose 38800->38801 38801->38799 38802->38455 38803->38802 38804->38387 38805->38441 38806->38422 38807->38422 38808->38456 38810 409c89 38809->38810 38810->38478 38811->38508 38813 413d39 38812->38813 38814 413d2f FreeLibrary 38812->38814 38815 40b633 ??3@YAXPAX 38813->38815 38814->38813 38816 413d42 38815->38816 38817 40b633 ??3@YAXPAX 38816->38817 38818 413d4a 38817->38818 38818->38336 38819->38339 38820->38390 38821->38404 38823 44db70 38822->38823 38824 40b6fc memset 38823->38824 38825 409c70 2 API calls 38824->38825 38826 40b732 wcsrchr 38825->38826 38827 40b743 38826->38827 38828 40b746 memset 38826->38828 38827->38828 38829 40b2cc 27 API calls 38828->38829 38830 40b76f 38829->38830 38831 409d1f 6 API calls 38830->38831 38832 40b783 38831->38832 39683 409b98 GetFileAttributesW 38832->39683 38834 40b792 38835 40b7c2 38834->38835 38836 409c70 2 API calls 38834->38836 39684 40bb98 38835->39684 38838 40b7a5 38836->38838 38840 40b2cc 27 API calls 38838->38840 38844 40b7b2 38840->38844 38841 40b837 FindCloseChangeNotification 38843 40b83e memset 38841->38843 38842 40b817 39718 409a45 GetTempPathW 38842->39718 39717 40a6e6 WideCharToMultiByte 38843->39717 38847 409d1f 6 API calls 38844->38847 38847->38835 38848 40b827 CopyFileW 38848->38843 38849 40b866 38850 444432 121 API calls 38849->38850 38851 40b879 38850->38851 38852 40bad5 38851->38852 38853 40b273 27 API calls 38851->38853 38854 40baeb 38852->38854 38855 40bade DeleteFileW 38852->38855 38856 40b89a 38853->38856 38857 40b04b ??3@YAXPAX 38854->38857 38855->38854 38858 438552 134 API calls 38856->38858 38859 40baf3 38857->38859 38860 40b8a4 38858->38860 38859->38415 38861 40bacd 38860->38861 38863 4251c4 137 API calls 38860->38863 38862 443d90 111 API calls 38861->38862 38862->38852 38886 40b8b8 38863->38886 38864 40bac6 39730 424f26 123 API calls 38864->39730 38865 40b8bd memset 39721 425413 17 API calls 38865->39721 38868 425413 17 API calls 38868->38886 38871 40a71b MultiByteToWideChar 38871->38886 38872 40a734 MultiByteToWideChar 38872->38886 38875 40b9b5 memcmp 38875->38886 38876 4099c6 2 API calls 38876->38886 38877 404423 37 API calls 38877->38886 38880 40bb3e memset memcpy 39731 40a734 MultiByteToWideChar 38880->39731 38881 4251c4 137 API calls 38881->38886 38883 40bb88 LocalFree 38883->38886 38886->38864 38886->38865 38886->38868 38886->38871 38886->38872 38886->38875 38886->38876 38886->38877 38886->38880 38886->38881 38887 40ba5f memcmp 38886->38887 39722 4253ef 16 API calls 38886->39722 39723 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38886->39723 39724 4253af 17 API calls 38886->39724 39725 4253cf 17 API calls 38886->39725 39726 447280 memset 38886->39726 39727 447960 memset memcpy memcpy memcpy 38886->39727 39728 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38886->39728 39729 447920 memcpy memcpy memcpy 38886->39729 38887->38886 38888->38417 38890 40aed1 38889->38890 38891 40aec7 FindClose 38889->38891 38890->38349 38891->38890 38893 4099d7 38892->38893 38894 4099da memcpy 38892->38894 38893->38894 38894->38400 38896 40b2cc 27 API calls 38895->38896 38897 44543f 38896->38897 38898 409d1f 6 API calls 38897->38898 38899 44544f 38898->38899 39823 409b98 GetFileAttributesW 38899->39823 38901 44545e 38902 445476 38901->38902 38903 40b6ef 252 API calls 38901->38903 38904 40b2cc 27 API calls 38902->38904 38903->38902 38905 445482 38904->38905 38906 409d1f 6 API calls 38905->38906 38907 445492 38906->38907 39824 409b98 GetFileAttributesW 38907->39824 38909 4454a1 38910 4454b9 38909->38910 38911 40b6ef 252 API calls 38909->38911 38910->38430 38911->38910 38912->38429 38913->38446 38914->38452 38915->38489 38916->38467 38917->38516 38918->38516 38919->38499 38920->38527 38921->38529 38922->38531 38924 414c2e 16 API calls 38923->38924 38925 40c2ae 38924->38925 38995 40c1d3 38925->38995 38930 40c3be 38947 40a8ab 38930->38947 38931 40afcf 2 API calls 38932 40c2fd FindFirstUrlCacheEntryW 38931->38932 38933 40c3b6 38932->38933 38934 40c31e wcschr 38932->38934 38935 40b04b ??3@YAXPAX 38933->38935 38936 40c331 38934->38936 38937 40c35e FindNextUrlCacheEntryW 38934->38937 38935->38930 38938 40a8ab 9 API calls 38936->38938 38937->38934 38939 40c373 GetLastError 38937->38939 38942 40c33e wcschr 38938->38942 38940 40c3ad FindCloseUrlCache 38939->38940 38941 40c37e 38939->38941 38940->38933 38943 40afcf 2 API calls 38941->38943 38942->38937 38944 40c34f 38942->38944 38945 40c391 FindNextUrlCacheEntryW 38943->38945 38946 40a8ab 9 API calls 38944->38946 38945->38934 38945->38940 38946->38937 39111 40a97a 38947->39111 38950 40a8cc 38950->38538 38951 40a8d0 7 API calls 38951->38950 39116 40b1ab ??3@YAXPAX ??3@YAXPAX 38952->39116 38954 40c3dd 38955 40b2cc 27 API calls 38954->38955 38956 40c3e7 38955->38956 39117 414592 RegOpenKeyExW 38956->39117 38958 40c3f4 38959 40c50e 38958->38959 38960 40c3ff 38958->38960 38974 405337 38959->38974 38961 40a9ce 4 API calls 38960->38961 38962 40c418 memset 38961->38962 39118 40aa1d 38962->39118 38965 40c471 38967 40c47a _wcsupr 38965->38967 38966 40c505 RegCloseKey 38966->38959 38968 40a8d0 7 API calls 38967->38968 38969 40c498 38968->38969 38970 40a8d0 7 API calls 38969->38970 38971 40c4ac memset 38970->38971 38972 40aa1d 38971->38972 38973 40c4e4 RegEnumValueW 38972->38973 38973->38966 38973->38967 39120 405220 38974->39120 38978 4099c6 2 API calls 38977->38978 38979 40a714 _wcslwr 38978->38979 38980 40c634 38979->38980 39177 405361 38980->39177 38983 40c65c wcslen 39180 4053b6 39 API calls 38983->39180 38984 40c71d wcslen 38984->38545 38986 40c677 38987 40c713 38986->38987 39181 40538b 39 API calls 38986->39181 39183 4053df 39 API calls 38987->39183 38990 40c6a5 38990->38987 38991 40c6a9 memset 38990->38991 38992 40c6d3 38991->38992 39182 40c589 43 API calls 38992->39182 38994->38546 38996 40ae18 9 API calls 38995->38996 39002 40c210 38996->39002 38997 40ae51 9 API calls 38997->39002 38998 40c264 38999 40aebe FindClose 38998->38999 39001 40c26f 38999->39001 39000 40add4 2 API calls 39000->39002 39007 40e5ed memset memset 39001->39007 39002->38997 39002->38998 39002->39000 39003 40c231 _wcsicmp 39002->39003 39004 40c1d3 35 API calls 39002->39004 39003->39002 39005 40c248 39003->39005 39004->39002 39020 40c084 22 API calls 39005->39020 39008 414c2e 16 API calls 39007->39008 39009 40e63f 39008->39009 39010 409d1f 6 API calls 39009->39010 39011 40e658 39010->39011 39021 409b98 GetFileAttributesW 39011->39021 39013 40e667 39014 40e680 39013->39014 39015 409d1f 6 API calls 39013->39015 39022 409b98 GetFileAttributesW 39014->39022 39015->39014 39017 40e68f 39018 40c2d8 39017->39018 39023 40e4b2 39017->39023 39018->38930 39018->38931 39020->39002 39021->39013 39022->39017 39044 40e01e 39023->39044 39025 40e593 39027 40e5b0 39025->39027 39028 40e59c DeleteFileW 39025->39028 39026 40e521 39026->39025 39067 40e175 39026->39067 39029 40b04b ??3@YAXPAX 39027->39029 39028->39027 39030 40e5bb 39029->39030 39032 40e5c4 CloseHandle 39030->39032 39033 40e5cc 39030->39033 39032->39033 39035 40b633 ??3@YAXPAX 39033->39035 39034 40e573 39036 40e584 39034->39036 39037 40e57c FindCloseChangeNotification 39034->39037 39038 40e5db 39035->39038 39110 40b1ab ??3@YAXPAX ??3@YAXPAX 39036->39110 39037->39036 39041 40b633 ??3@YAXPAX 39038->39041 39040 40e540 39040->39034 39087 40e2ab 39040->39087 39042 40e5e3 39041->39042 39042->39018 39045 406214 22 API calls 39044->39045 39046 40e03c 39045->39046 39047 40e16b 39046->39047 39048 40dd85 74 API calls 39046->39048 39047->39026 39049 40e06b 39048->39049 39049->39047 39050 40afcf ??2@YAPAXI ??3@YAXPAX 39049->39050 39051 40e08d OpenProcess 39050->39051 39052 40e0a4 GetCurrentProcess DuplicateHandle 39051->39052 39056 40e152 39051->39056 39053 40e0d0 GetFileSize 39052->39053 39054 40e14a CloseHandle 39052->39054 39057 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39053->39057 39054->39056 39055 40e160 39059 40b04b ??3@YAXPAX 39055->39059 39056->39055 39058 406214 22 API calls 39056->39058 39060 40e0ea 39057->39060 39058->39055 39059->39047 39061 4096dc CreateFileW 39060->39061 39062 40e0f1 CreateFileMappingW 39061->39062 39063 40e140 CloseHandle CloseHandle 39062->39063 39064 40e10b MapViewOfFile 39062->39064 39063->39054 39065 40e13b FindCloseChangeNotification 39064->39065 39066 40e11f WriteFile UnmapViewOfFile 39064->39066 39065->39063 39066->39065 39068 40e18c 39067->39068 39069 406b90 11 API calls 39068->39069 39070 40e19f 39069->39070 39071 40e1a7 memset 39070->39071 39072 40e299 39070->39072 39077 40e1e8 39071->39077 39073 4069a3 ??3@YAXPAX ??3@YAXPAX 39072->39073 39074 40e2a4 39073->39074 39074->39040 39075 406e8f 13 API calls 39075->39077 39076 406b53 SetFilePointerEx ReadFile 39076->39077 39077->39075 39077->39076 39078 40e283 39077->39078 39079 40dd50 _wcsicmp 39077->39079 39083 40742e 8 API calls 39077->39083 39084 40aae3 wcslen wcslen _memicmp 39077->39084 39085 40e244 _snwprintf 39077->39085 39080 40e291 39078->39080 39081 40e288 ??3@YAXPAX 39078->39081 39079->39077 39082 40aa04 ??3@YAXPAX 39080->39082 39081->39080 39082->39072 39083->39077 39084->39077 39086 40a8d0 7 API calls 39085->39086 39086->39077 39088 40e2c2 39087->39088 39089 406b90 11 API calls 39088->39089 39100 40e2d3 39089->39100 39090 40e4a0 39091 4069a3 ??3@YAXPAX ??3@YAXPAX 39090->39091 39093 40e4ab 39091->39093 39092 406e8f 13 API calls 39092->39100 39093->39040 39094 406b53 SetFilePointerEx ReadFile 39094->39100 39095 40e489 39096 40aa04 ??3@YAXPAX 39095->39096 39097 40e491 39096->39097 39097->39090 39098 40e497 ??3@YAXPAX 39097->39098 39098->39090 39099 40dd50 _wcsicmp 39099->39100 39100->39090 39100->39092 39100->39094 39100->39095 39100->39099 39101 40dd50 _wcsicmp 39100->39101 39104 40742e 8 API calls 39100->39104 39105 40e3e0 memcpy 39100->39105 39106 40e3b3 wcschr 39100->39106 39107 40e3fb memcpy 39100->39107 39108 40e416 memcpy 39100->39108 39109 40e431 memcpy 39100->39109 39102 40e376 memset 39101->39102 39103 40aa29 6 API calls 39102->39103 39103->39100 39104->39100 39105->39100 39106->39100 39107->39100 39108->39100 39109->39100 39110->39025 39113 40a980 39111->39113 39112 40a8bb 39112->38950 39112->38951 39113->39112 39114 40a995 _wcsicmp 39113->39114 39115 40a99c wcscmp 39113->39115 39114->39113 39115->39113 39116->38954 39117->38958 39119 40aa23 RegEnumValueW 39118->39119 39119->38965 39119->38966 39121 405335 39120->39121 39122 40522a 39120->39122 39121->38545 39123 40b2cc 27 API calls 39122->39123 39124 405234 39123->39124 39125 40a804 8 API calls 39124->39125 39126 40523a 39125->39126 39165 40b273 39126->39165 39128 405248 _mbscpy _mbscat GetProcAddress 39129 40b273 27 API calls 39128->39129 39130 405279 39129->39130 39168 405211 GetProcAddress 39130->39168 39132 405282 39133 40b273 27 API calls 39132->39133 39134 40528f 39133->39134 39169 405211 GetProcAddress 39134->39169 39136 405298 39137 40b273 27 API calls 39136->39137 39138 4052a5 39137->39138 39170 405211 GetProcAddress 39138->39170 39140 4052ae 39141 40b273 27 API calls 39140->39141 39142 4052bb 39141->39142 39171 405211 GetProcAddress 39142->39171 39144 4052c4 39145 40b273 27 API calls 39144->39145 39146 4052d1 39145->39146 39172 405211 GetProcAddress 39146->39172 39148 4052da 39149 40b273 27 API calls 39148->39149 39150 4052e7 39149->39150 39173 405211 GetProcAddress 39150->39173 39152 4052f0 39153 40b273 27 API calls 39152->39153 39154 4052fd 39153->39154 39174 405211 GetProcAddress 39154->39174 39156 405306 39157 40b273 27 API calls 39156->39157 39158 405313 39157->39158 39175 405211 GetProcAddress 39158->39175 39160 40531c 39161 40b273 27 API calls 39160->39161 39162 405329 39161->39162 39166 40b58d 27 API calls 39165->39166 39167 40b18c 39166->39167 39167->39128 39168->39132 39169->39136 39170->39140 39171->39144 39172->39148 39173->39152 39174->39156 39175->39160 39178 405220 39 API calls 39177->39178 39179 405369 39178->39179 39179->38983 39179->38984 39180->38986 39181->38990 39182->38987 39183->38984 39185 40440c FreeLibrary 39184->39185 39186 40436d 39185->39186 39187 40a804 8 API calls 39186->39187 39188 404377 39187->39188 39189 404383 39188->39189 39190 404405 39188->39190 39191 40b273 27 API calls 39189->39191 39190->38557 39190->38559 39190->38560 39192 40438d GetProcAddress 39191->39192 39193 40b273 27 API calls 39192->39193 39194 4043a7 GetProcAddress 39193->39194 39195 40b273 27 API calls 39194->39195 39196 4043ba GetProcAddress 39195->39196 39197 40b273 27 API calls 39196->39197 39198 4043ce GetProcAddress 39197->39198 39199 40b273 27 API calls 39198->39199 39200 4043e2 GetProcAddress 39199->39200 39201 4043f1 39200->39201 39202 4043f7 39201->39202 39203 40440c FreeLibrary 39201->39203 39202->39190 39203->39190 39205 404413 FreeLibrary 39204->39205 39206 40441e 39204->39206 39205->39206 39206->38574 39207->38565 39209 40442e 39208->39209 39210 40447e 39208->39210 39211 40b2cc 27 API calls 39209->39211 39210->38565 39212 404438 39211->39212 39213 40a804 8 API calls 39212->39213 39214 40443e 39213->39214 39215 404445 39214->39215 39216 404467 39214->39216 39217 40b273 27 API calls 39215->39217 39216->39210 39218 404475 FreeLibrary 39216->39218 39219 40444f GetProcAddress 39217->39219 39218->39210 39219->39216 39220 404460 39219->39220 39220->39216 39222 4135f6 39221->39222 39223 4135eb FreeLibrary 39221->39223 39222->38577 39223->39222 39225 4449c4 39224->39225 39226 444a52 39224->39226 39227 40b2cc 27 API calls 39225->39227 39226->38594 39226->38595 39228 4449cb 39227->39228 39229 40a804 8 API calls 39228->39229 39230 4449d1 39229->39230 39231 40b273 27 API calls 39230->39231 39232 4449dc GetProcAddress 39231->39232 39233 40b273 27 API calls 39232->39233 39234 4449f3 GetProcAddress 39233->39234 39235 40b273 27 API calls 39234->39235 39236 444a04 GetProcAddress 39235->39236 39237 40b273 27 API calls 39236->39237 39238 444a15 GetProcAddress 39237->39238 39239 40b273 27 API calls 39238->39239 39240 444a26 GetProcAddress 39239->39240 39241 40b273 27 API calls 39240->39241 39245->38605 39246->38605 39247->38605 39248->38605 39249->38596 39251 403a29 39250->39251 39265 403bed memset memset 39251->39265 39253 403ae7 39278 40b1ab ??3@YAXPAX ??3@YAXPAX 39253->39278 39254 403a3f memset 39260 403a2f 39254->39260 39256 403aef 39256->38613 39257 409b98 GetFileAttributesW 39257->39260 39258 40a8d0 7 API calls 39258->39260 39259 409d1f 6 API calls 39259->39260 39260->39253 39260->39254 39260->39257 39260->39258 39260->39259 39262 40a051 GetFileTime FindCloseChangeNotification 39261->39262 39263 4039ca CompareFileTime 39261->39263 39262->39263 39263->38613 39264->38612 39266 414c2e 16 API calls 39265->39266 39267 403c38 39266->39267 39268 409719 2 API calls 39267->39268 39269 403c3f wcscat 39268->39269 39270 414c2e 16 API calls 39269->39270 39271 403c61 39270->39271 39272 409719 2 API calls 39271->39272 39273 403c68 wcscat 39272->39273 39279 403af5 39273->39279 39276 403af5 20 API calls 39277 403c95 39276->39277 39277->39260 39278->39256 39280 403b02 39279->39280 39281 40ae18 9 API calls 39280->39281 39289 403b37 39281->39289 39282 403bdb 39284 40aebe FindClose 39282->39284 39283 40add4 wcscmp wcscmp 39283->39289 39285 403be6 39284->39285 39285->39276 39286 40ae18 9 API calls 39286->39289 39287 40ae51 9 API calls 39287->39289 39288 40aebe FindClose 39288->39289 39289->39282 39289->39283 39289->39286 39289->39287 39289->39288 39290 40a8d0 7 API calls 39289->39290 39290->39289 39292 409d1f 6 API calls 39291->39292 39293 404190 39292->39293 39306 409b98 GetFileAttributesW 39293->39306 39295 40419c 39296 4041a7 6 API calls 39295->39296 39297 40435c 39295->39297 39299 40424f 39296->39299 39297->38639 39299->39297 39300 40425e memset 39299->39300 39302 409d1f 6 API calls 39299->39302 39303 40a8ab 9 API calls 39299->39303 39307 414842 39299->39307 39300->39299 39301 404296 wcscpy 39300->39301 39301->39299 39302->39299 39304 4042b6 memset memset _snwprintf wcscpy 39303->39304 39304->39299 39305->38637 39306->39295 39310 41443e 39307->39310 39309 414866 39309->39299 39311 41444b 39310->39311 39312 414451 39311->39312 39313 4144a3 GetPrivateProfileStringW 39311->39313 39314 414491 39312->39314 39315 414455 wcschr 39312->39315 39313->39309 39317 414495 WritePrivateProfileStringW 39314->39317 39315->39314 39316 414463 _snwprintf 39315->39316 39316->39317 39317->39309 39318->38643 39320 40b2cc 27 API calls 39319->39320 39321 409615 39320->39321 39322 409d1f 6 API calls 39321->39322 39323 409625 39322->39323 39348 409b98 GetFileAttributesW 39323->39348 39325 409634 39326 409648 39325->39326 39349 4091b8 memset 39325->39349 39328 40b2cc 27 API calls 39326->39328 39330 408801 39326->39330 39329 40965d 39328->39329 39331 409d1f 6 API calls 39329->39331 39330->38646 39330->38647 39332 40966d 39331->39332 39401 409b98 GetFileAttributesW 39332->39401 39334 40967c 39334->39330 39335 409681 39334->39335 39402 409529 72 API calls 39335->39402 39337 409690 39337->39330 39348->39325 39403 40a6e6 WideCharToMultiByte 39349->39403 39351 409202 39404 444432 39351->39404 39354 40b273 27 API calls 39355 409236 39354->39355 39450 438552 39355->39450 39358 409383 39360 40b273 27 API calls 39358->39360 39362 409399 39360->39362 39364 438552 134 API calls 39362->39364 39382 4093a3 39364->39382 39379 4253cf 17 API calls 39379->39382 39381 40951d 39381->39326 39382->39379 39401->39334 39402->39337 39403->39351 39500 4438b5 39404->39500 39406 44444c 39412 409215 39406->39412 39514 415a6d 39406->39514 39408 4442e6 11 API calls 39410 44469e 39408->39410 39409 444486 39411 4444b9 memcpy 39409->39411 39449 4444a4 39409->39449 39410->39412 39414 443d90 111 API calls 39410->39414 39518 415258 39411->39518 39412->39354 39412->39381 39414->39412 39415 444524 39416 444541 39415->39416 39417 44452a 39415->39417 39521 444316 39416->39521 39418 416935 16 API calls 39417->39418 39418->39449 39421 444316 18 API calls 39449->39408 39588 438460 39450->39588 39452 409240 39452->39358 39453 4251c4 39452->39453 39600 424f07 39453->39600 39455 4251e4 39501 4438d0 39500->39501 39511 4438c9 39500->39511 39502 415378 memcpy memcpy 39501->39502 39503 4438d5 39502->39503 39504 4154e2 10 API calls 39503->39504 39505 443906 39503->39505 39503->39511 39504->39505 39506 443970 memset 39505->39506 39505->39511 39509 44398b 39506->39509 39507 4439a0 39508 415700 10 API calls 39507->39508 39507->39511 39512 4439c0 39508->39512 39509->39507 39510 41975c 10 API calls 39509->39510 39510->39507 39511->39406 39512->39511 39513 418981 10 API calls 39512->39513 39513->39511 39515 415a77 39514->39515 39516 415a8d 39515->39516 39517 415a7e memset 39515->39517 39516->39409 39517->39516 39519 4438b5 11 API calls 39518->39519 39520 41525d 39519->39520 39520->39415 39522 444328 39521->39522 39523 444423 39522->39523 39524 44434e 39522->39524 39525 4446ea 11 API calls 39523->39525 39526 432d4e memset memset memcpy 39524->39526 39532 444381 39525->39532 39527 44435a 39526->39527 39529 444375 39527->39529 39534 44438b 39527->39534 39532->39421 39589 41703f 11 API calls 39588->39589 39590 43847a 39589->39590 39591 43848a 39590->39591 39592 43847e 39590->39592 39594 438270 134 API calls 39591->39594 39593 4446ea 11 API calls 39592->39593 39596 438488 39593->39596 39595 4384aa 39594->39595 39595->39596 39597 424f26 123 API calls 39595->39597 39596->39452 39598 4384bb 39597->39598 39599 438270 134 API calls 39598->39599 39599->39596 39601 424f1f 39600->39601 39602 424f0c 39600->39602 39604 424eea 11 API calls 39601->39604 39603 416760 11 API calls 39602->39603 39605 424f18 39603->39605 39606 424f24 39604->39606 39605->39455 39606->39455 39667 413f4f 39640->39667 39643 413f37 K32GetModuleFileNameExW 39644 413f4a 39643->39644 39644->38706 39646 413969 wcscpy 39645->39646 39647 41396c wcschr 39645->39647 39659 413a3a 39646->39659 39647->39646 39649 41398e 39647->39649 39672 4097f7 wcslen wcslen _memicmp 39649->39672 39651 41399a 39652 4139a4 memset 39651->39652 39653 4139e6 39651->39653 39673 409dd5 GetWindowsDirectoryW wcscpy 39652->39673 39655 413a31 wcscpy 39653->39655 39656 4139ec memset 39653->39656 39655->39659 39674 409dd5 GetWindowsDirectoryW wcscpy 39656->39674 39657 4139c9 wcscpy wcscat 39657->39659 39659->38706 39660 413a11 memcpy wcscat 39660->39659 39662 413cb0 GetModuleHandleW 39661->39662 39663 413cda 39661->39663 39662->39663 39664 413cbf GetProcAddress 39662->39664 39665 413ce3 GetProcessTimes 39663->39665 39666 413cf6 39663->39666 39664->39663 39665->38708 39666->38708 39668 413f2f 39667->39668 39669 413f54 39667->39669 39668->39643 39668->39644 39670 40a804 8 API calls 39669->39670 39671 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39670->39671 39671->39668 39672->39651 39673->39657 39674->39660 39675->38729 39676->38752 39678 409cf9 GetVersionExW 39677->39678 39679 409d0a 39677->39679 39678->39679 39679->38758 39679->38762 39680->38764 39681->38767 39682->38769 39683->38834 39685 40bba5 39684->39685 39732 40cc26 39685->39732 39688 40bd4b 39753 40cc0c 39688->39753 39693 40b2cc 27 API calls 39694 40bbef 39693->39694 39760 40ccf0 _wcsicmp 39694->39760 39696 40bbf5 39696->39688 39761 40ccb4 6 API calls 39696->39761 39698 40bc26 39699 40cf04 17 API calls 39698->39699 39700 40bc2e 39699->39700 39701 40bd43 39700->39701 39702 40b2cc 27 API calls 39700->39702 39703 40cc0c 4 API calls 39701->39703 39704 40bc40 39702->39704 39703->39688 39762 40ccf0 _wcsicmp 39704->39762 39706 40bc46 39706->39701 39707 40bc61 memset memset WideCharToMultiByte 39706->39707 39763 40103c strlen 39707->39763 39709 40bcc0 39710 40b273 27 API calls 39709->39710 39711 40bcd0 memcmp 39710->39711 39711->39701 39712 40bce2 39711->39712 39713 404423 37 API calls 39712->39713 39714 40bd10 39713->39714 39714->39701 39715 40bd3a LocalFree 39714->39715 39716 40bd1f memcpy 39714->39716 39715->39701 39716->39715 39717->38849 39719 409a74 GetTempFileNameW 39718->39719 39720 409a66 GetWindowsDirectoryW 39718->39720 39719->38848 39720->39719 39721->38886 39722->38886 39723->38886 39724->38886 39725->38886 39726->38886 39727->38886 39728->38886 39729->38886 39730->38861 39731->38883 39764 4096c3 CreateFileW 39732->39764 39734 40cc34 39735 40cc3d GetFileSize 39734->39735 39743 40bbca 39734->39743 39736 40afcf 2 API calls 39735->39736 39737 40cc64 39736->39737 39765 40a2ef ReadFile 39737->39765 39739 40cc71 39766 40ab4a MultiByteToWideChar 39739->39766 39741 40cc95 FindCloseChangeNotification 39742 40b04b ??3@YAXPAX 39741->39742 39742->39743 39743->39688 39744 40cf04 39743->39744 39745 40b633 ??3@YAXPAX 39744->39745 39746 40cf14 39745->39746 39772 40b1ab ??3@YAXPAX ??3@YAXPAX 39746->39772 39748 40bbdd 39748->39688 39748->39693 39749 40cf1b 39749->39748 39751 40cfef 39749->39751 39773 40cd4b 39749->39773 39752 40cd4b 14 API calls 39751->39752 39752->39748 39754 40b633 ??3@YAXPAX 39753->39754 39755 40cc15 39754->39755 39756 40aa04 ??3@YAXPAX 39755->39756 39757 40cc1d 39756->39757 39822 40b1ab ??3@YAXPAX ??3@YAXPAX 39757->39822 39759 40b7d4 memset CreateFileW 39759->38841 39759->38842 39760->39696 39761->39698 39762->39706 39763->39709 39764->39734 39765->39739 39767 40ab6b 39766->39767 39771 40ab93 39766->39771 39768 40a9ce 4 API calls 39767->39768 39769 40ab74 39768->39769 39770 40ab7c MultiByteToWideChar 39769->39770 39770->39771 39771->39741 39772->39749 39774 40cd7b 39773->39774 39807 40aa29 39774->39807 39776 40cef5 39777 40aa04 ??3@YAXPAX 39776->39777 39778 40cefd 39777->39778 39778->39749 39780 40aa29 6 API calls 39781 40ce1d 39780->39781 39782 40aa29 6 API calls 39781->39782 39783 40ce3e 39782->39783 39784 40ce6a 39783->39784 39815 40abb7 wcslen memmove 39783->39815 39785 40ce9f 39784->39785 39818 40abb7 wcslen memmove 39784->39818 39787 40a8d0 7 API calls 39785->39787 39791 40ceb5 39787->39791 39788 40ce56 39816 40aa71 wcslen 39788->39816 39790 40ce8b 39819 40aa71 wcslen 39790->39819 39797 40a8d0 7 API calls 39791->39797 39794 40ce5e 39817 40abb7 wcslen memmove 39794->39817 39795 40ce93 39820 40abb7 wcslen memmove 39795->39820 39799 40cecb 39797->39799 39821 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39799->39821 39801 40cedd 39802 40aa04 ??3@YAXPAX 39801->39802 39803 40cee5 39802->39803 39804 40aa04 ??3@YAXPAX 39803->39804 39805 40ceed 39804->39805 39806 40aa04 ??3@YAXPAX 39805->39806 39806->39776 39808 40aa33 39807->39808 39809 40aa63 39807->39809 39810 40aa44 39808->39810 39811 40aa38 wcslen 39808->39811 39809->39776 39809->39780 39812 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39810->39812 39811->39810 39813 40aa4d 39812->39813 39813->39809 39814 40aa51 memcpy 39813->39814 39814->39809 39815->39788 39816->39794 39817->39784 39818->39790 39819->39795 39820->39785 39821->39801 39822->39759 39823->38901 39824->38909 39901 44def7 39902 44df07 39901->39902 39903 44df00 ??3@YAXPAX 39901->39903 39904 44df17 39902->39904 39905 44df10 ??3@YAXPAX 39902->39905 39903->39902 39906 44df27 39904->39906 39907 44df20 ??3@YAXPAX 39904->39907 39905->39904 39908 44df37 39906->39908 39909 44df30 ??3@YAXPAX 39906->39909 39907->39906 39909->39908 37668 44dea5 37669 44deb5 FreeLibrary 37668->37669 37670 44dec3 37668->37670 37669->37670 39910 4148b6 FindResourceW 39911 4148f9 39910->39911 39912 4148cf SizeofResource 39910->39912 39912->39911 39913 4148e0 LoadResource 39912->39913 39913->39911 39914 4148ee LockResource 39913->39914 39914->39911 37849 415304 ??3@YAXPAX 37671 415320 realloc 37672 415340 37671->37672 37673 41534d 37671->37673 37675 416760 11 API calls 37673->37675 37675->37672 39825 427533 39829 427548 39825->39829 39838 425711 39825->39838 39826 4259da 39882 416760 11 API calls 39826->39882 39828 4275cb 39862 425506 39828->39862 39829->39828 39836 429b7a 39829->39836 39830 4260dd 39883 424251 120 API calls 39830->39883 39831 4259c2 39858 425ad6 39831->39858 39876 415c56 11 API calls 39831->39876 39888 4446ce 11 API calls 39836->39888 39838->39826 39838->39831 39841 429a4d 39838->39841 39842 422aeb memset memcpy memcpy 39838->39842 39846 4260a1 39838->39846 39852 429ac1 39838->39852 39861 425a38 39838->39861 39872 4227f0 memset memcpy 39838->39872 39873 422b84 15 API calls 39838->39873 39874 422b5d memset memcpy memcpy 39838->39874 39875 422640 13 API calls 39838->39875 39877 4241fc 11 API calls 39838->39877 39878 42413a 90 API calls 39838->39878 39843 429a66 39841->39843 39844 429a9b 39841->39844 39842->39838 39884 415c56 11 API calls 39843->39884 39848 429a96 39844->39848 39886 416760 11 API calls 39844->39886 39881 415c56 11 API calls 39846->39881 39887 424251 120 API calls 39848->39887 39851 429a7a 39885 416760 11 API calls 39851->39885 39852->39826 39852->39858 39889 415c56 11 API calls 39852->39889 39861->39831 39879 422640 13 API calls 39861->39879 39880 4226e0 12 API calls 39861->39880 39863 425554 39862->39863 39864 42554d 39862->39864 39891 422586 12 API calls 39863->39891 39890 423b34 103 API calls 39864->39890 39867 425567 39868 4255ba 39867->39868 39869 42556c memset 39867->39869 39868->39838 39870 425596 39869->39870 39870->39868 39871 4255a4 memset 39870->39871 39871->39868 39872->39838 39873->39838 39874->39838 39875->39838 39876->39826 39877->39838 39878->39838 39879->39861 39880->39861 39881->39826 39882->39830 39883->39858 39884->39851 39885->39848 39886->39848 39887->39852 39888->39852 39889->39826 39890->39863 39891->39867 39915 441b3f 39925 43a9f6 39915->39925 39917 441b61 40098 4386af memset 39917->40098 39919 44189a 39920 4418e2 39919->39920 39924 442bd4 39919->39924 39922 4418ea 39920->39922 40099 4414a9 12 API calls 39920->40099 39924->39922 40100 441409 memset 39924->40100 39926 43aa20 39925->39926 39927 43aadf 39925->39927 39926->39927 39928 43aa34 memset 39926->39928 39927->39917 39929 43aa56 39928->39929 39930 43aa4d 39928->39930 40101 43a6e7 39929->40101 40109 42c02e memset 39930->40109 39935 43aad3 40111 4169a7 11 API calls 39935->40111 39936 43aaae 39936->39927 39936->39935 39951 43aae5 39936->39951 39937 43ac18 39940 43ac47 39937->39940 40113 42bbd5 memcpy memcpy memcpy memset memcpy 39937->40113 39941 43aca8 39940->39941 40114 438eed 16 API calls 39940->40114 39945 43acd5 39941->39945 40116 4233ae 11 API calls 39941->40116 39944 43ac87 40115 4233c5 16 API calls 39944->40115 40117 423426 11 API calls 39945->40117 39949 43ace1 40118 439811 163 API calls 39949->40118 39950 43a9f6 161 API calls 39950->39951 39951->39927 39951->39937 39951->39950 40112 439bbb 22 API calls 39951->40112 39953 43acfd 39958 43ad2c 39953->39958 40119 438eed 16 API calls 39953->40119 39955 43ad19 40120 4233c5 16 API calls 39955->40120 39957 43ad58 40121 44081d 163 API calls 39957->40121 39958->39957 39961 43add9 39958->39961 40125 423426 11 API calls 39961->40125 39962 43ae3a memset 39963 43ae73 39962->39963 40126 42e1c0 147 API calls 39963->40126 39964 43adab 40123 438c4e 163 API calls 39964->40123 39965 43ad6c 39965->39927 39965->39964 40122 42370b memset memcpy memset 39965->40122 39969 43adcc 40124 440f84 12 API calls 39969->40124 39970 43ae96 40127 42e1c0 147 API calls 39970->40127 39973 43aea8 39974 43aec1 39973->39974 40128 42e199 147 API calls 39973->40128 39976 43af00 39974->39976 40129 42e1c0 147 API calls 39974->40129 39976->39927 39979 43af1a 39976->39979 39980 43b3d9 39976->39980 40130 438eed 16 API calls 39979->40130 39985 43b3f6 39980->39985 39986 43b4c8 39980->39986 39981 43b60f 39981->39927 40189 4393a5 17 API calls 39981->40189 39984 43af2f 40131 4233c5 16 API calls 39984->40131 40171 432878 12 API calls 39985->40171 39996 43b4f2 39986->39996 40177 42bbd5 memcpy memcpy memcpy memset memcpy 39986->40177 39988 43af51 40132 423426 11 API calls 39988->40132 39991 43af7d 40133 423426 11 API calls 39991->40133 39995 43af94 40134 423330 11 API calls 39995->40134 40178 43a76c 21 API calls 39996->40178 39997 43b529 40179 44081d 163 API calls 39997->40179 39998 43b462 40173 423330 11 API calls 39998->40173 40002 43b428 40002->39998 40172 432b60 16 API calls 40002->40172 40003 43afca 40135 423330 11 API calls 40003->40135 40004 43b47e 40008 43b497 40004->40008 40174 42374a memcpy memset memcpy memcpy memcpy 40004->40174 40005 43b544 40006 43b55c 40005->40006 40180 42c02e memset 40005->40180 40181 43a87a 163 API calls 40006->40181 40175 4233ae 11 API calls 40008->40175 40010 43afdb 40136 4233ae 11 API calls 40010->40136 40014 43b4b1 40176 423399 11 API calls 40014->40176 40016 43b56c 40019 43b58a 40016->40019 40182 423330 11 API calls 40016->40182 40018 43afee 40137 44081d 163 API calls 40018->40137 40183 440f84 12 API calls 40019->40183 40020 43b4c1 40185 42db80 163 API calls 40020->40185 40025 43b592 40184 43a82f 16 API calls 40025->40184 40028 43b5b4 40186 438c4e 163 API calls 40028->40186 40030 43b5cf 40187 42c02e memset 40030->40187 40032 43b005 40032->39927 40037 43b01f 40032->40037 40138 42d836 163 API calls 40032->40138 40033 43b1ef 40148 4233c5 16 API calls 40033->40148 40035 43b212 40149 423330 11 API calls 40035->40149 40037->40033 40146 423330 11 API calls 40037->40146 40147 42d71d 163 API calls 40037->40147 40039 43b087 40139 4233ae 11 API calls 40039->40139 40040 43add4 40040->39981 40188 438f86 16 API calls 40040->40188 40043 43b22a 40150 42ccb5 11 API calls 40043->40150 40046 43b23f 40151 4233ae 11 API calls 40046->40151 40047 43b10f 40142 423330 11 API calls 40047->40142 40049 43b257 40152 4233ae 11 API calls 40049->40152 40053 43b129 40143 4233ae 11 API calls 40053->40143 40054 43b26e 40153 4233ae 11 API calls 40054->40153 40057 43b09a 40057->40047 40140 42cc15 19 API calls 40057->40140 40141 4233ae 11 API calls 40057->40141 40058 43b282 40154 43a87a 163 API calls 40058->40154 40060 43b13c 40144 440f84 12 API calls 40060->40144 40062 43b29d 40155 423330 11 API calls 40062->40155 40065 43b2af 40068 43b2b8 40065->40068 40069 43b2ce 40065->40069 40066 43b15f 40145 4233ae 11 API calls 40066->40145 40156 4233ae 11 API calls 40068->40156 40157 440f84 12 API calls 40069->40157 40072 43b2c9 40159 4233ae 11 API calls 40072->40159 40073 43b2da 40158 42370b memset memcpy memset 40073->40158 40076 43b2f9 40160 423330 11 API calls 40076->40160 40078 43b30b 40161 423330 11 API calls 40078->40161 40080 43b325 40162 423399 11 API calls 40080->40162 40082 43b332 40163 4233ae 11 API calls 40082->40163 40084 43b354 40164 423399 11 API calls 40084->40164 40086 43b364 40165 43a82f 16 API calls 40086->40165 40088 43b370 40166 42db80 163 API calls 40088->40166 40090 43b380 40167 438c4e 163 API calls 40090->40167 40092 43b39e 40168 423399 11 API calls 40092->40168 40094 43b3ae 40169 43a76c 21 API calls 40094->40169 40096 43b3c3 40170 423399 11 API calls 40096->40170 40098->39919 40099->39922 40100->39924 40102 43a6f5 40101->40102 40104 43a765 40101->40104 40102->40104 40190 42a115 40102->40190 40104->39927 40110 4397fd memset 40104->40110 40107 43a73d 40107->40104 40108 42a115 147 API calls 40107->40108 40108->40104 40109->39929 40110->39936 40111->39927 40112->39951 40113->39940 40114->39944 40115->39941 40116->39945 40117->39949 40118->39953 40119->39955 40120->39958 40121->39965 40122->39964 40123->39969 40124->40040 40125->39962 40126->39970 40127->39973 40128->39974 40129->39974 40130->39984 40131->39988 40132->39991 40133->39995 40134->40003 40135->40010 40136->40018 40137->40032 40138->40039 40139->40057 40140->40057 40141->40057 40142->40053 40143->40060 40144->40066 40145->40037 40146->40037 40147->40037 40148->40035 40149->40043 40150->40046 40151->40049 40152->40054 40153->40058 40154->40062 40155->40065 40156->40072 40157->40073 40158->40072 40159->40076 40160->40078 40161->40080 40162->40082 40163->40084 40164->40086 40165->40088 40166->40090 40167->40092 40168->40094 40169->40096 40170->40040 40171->40002 40172->39998 40173->40004 40174->40008 40175->40014 40176->40020 40177->39996 40178->39997 40179->40005 40180->40006 40181->40016 40182->40019 40183->40025 40184->40020 40185->40028 40186->40030 40187->40040 40188->39981 40189->39927 40191 42a175 40190->40191 40193 42a122 40190->40193 40191->40104 40196 42b13b 147 API calls 40191->40196 40193->40191 40194 42a115 147 API calls 40193->40194 40197 43a174 40193->40197 40221 42a0a8 147 API calls 40193->40221 40194->40193 40196->40107 40211 43a196 40197->40211 40212 43a19e 40197->40212 40198 43a306 40198->40211 40241 4388c4 14 API calls 40198->40241 40201 42a115 147 API calls 40201->40212 40203 43a642 40203->40211 40245 4169a7 11 API calls 40203->40245 40207 43a635 40244 42c02e memset 40207->40244 40211->40193 40212->40198 40212->40201 40212->40211 40222 42ff8c 40212->40222 40230 415a91 40212->40230 40234 4165ff 40212->40234 40237 439504 13 API calls 40212->40237 40238 4312d0 147 API calls 40212->40238 40239 42be4c memcpy memcpy memcpy memset memcpy 40212->40239 40240 43a121 11 API calls 40212->40240 40214 4169a7 11 API calls 40215 43a325 40214->40215 40215->40203 40215->40207 40215->40211 40215->40214 40216 42b5b5 memset memcpy 40215->40216 40217 42bf4c 14 API calls 40215->40217 40220 4165ff 11 API calls 40215->40220 40242 42b63e 14 API calls 40215->40242 40243 42bfcf memcpy 40215->40243 40216->40215 40217->40215 40220->40215 40221->40193 40246 43817e 40222->40246 40224 42ff99 40225 42ffe3 40224->40225 40226 42ffd0 40224->40226 40229 42ff9d 40224->40229 40251 4169a7 11 API calls 40225->40251 40250 4169a7 11 API calls 40226->40250 40229->40212 40231 415a9d 40230->40231 40232 415ab3 40231->40232 40233 415aa4 memset 40231->40233 40232->40212 40233->40232 40398 4165a0 40234->40398 40237->40212 40238->40212 40239->40212 40240->40212 40241->40215 40242->40215 40243->40215 40244->40203 40245->40211 40247 438187 40246->40247 40249 438192 40246->40249 40252 4380f6 40247->40252 40249->40224 40250->40229 40251->40229 40254 43811f 40252->40254 40253 438164 40253->40249 40254->40253 40256 4300e8 3 API calls 40254->40256 40257 437e5e 40254->40257 40256->40254 40280 437d3c 40257->40280 40259 437eb3 40259->40254 40260 437ea9 40260->40259 40265 437f22 40260->40265 40295 41f432 40260->40295 40263 437f06 40342 415c56 11 API calls 40263->40342 40267 437f7f 40265->40267 40268 432d4e 3 API calls 40265->40268 40266 437f95 40343 415c56 11 API calls 40266->40343 40267->40266 40269 43802b 40267->40269 40268->40267 40271 4165ff 11 API calls 40269->40271 40272 438054 40271->40272 40306 437371 40272->40306 40275 43806b 40276 438094 40275->40276 40344 42f50e 138 API calls 40275->40344 40278 4300e8 3 API calls 40276->40278 40279 437fa3 40276->40279 40278->40279 40279->40259 40345 41f638 104 API calls 40279->40345 40281 437d69 40280->40281 40284 437d80 40280->40284 40346 437ccb 11 API calls 40281->40346 40283 437d76 40283->40260 40284->40283 40285 437da3 40284->40285 40286 437d90 40284->40286 40288 438460 134 API calls 40285->40288 40286->40283 40350 437ccb 11 API calls 40286->40350 40291 437dcb 40288->40291 40289 437de8 40349 424f26 123 API calls 40289->40349 40291->40289 40347 444283 13 API calls 40291->40347 40293 437dfc 40348 437ccb 11 API calls 40293->40348 40296 41f54d 40295->40296 40302 41f44f 40295->40302 40297 41f466 40296->40297 40380 41c635 memset memset 40296->40380 40297->40263 40297->40265 40302->40297 40304 41f50b 40302->40304 40351 41f1a5 40302->40351 40376 41c06f memcmp 40302->40376 40377 41f3b1 90 API calls 40302->40377 40378 41f398 86 API calls 40302->40378 40304->40296 40304->40297 40379 41c295 86 API calls 40304->40379 40381 41703f 40306->40381 40308 437399 40309 43739d 40308->40309 40311 4373ac 40308->40311 40388 4446ea 11 API calls 40309->40388 40312 416935 16 API calls 40311->40312 40313 4373ca 40312->40313 40314 438460 134 API calls 40313->40314 40319 4251c4 137 API calls 40313->40319 40323 415a91 memset 40313->40323 40326 43758f 40313->40326 40338 437584 40313->40338 40341 437d3c 135 API calls 40313->40341 40389 425433 13 API calls 40313->40389 40390 425413 17 API calls 40313->40390 40391 42533e 16 API calls 40313->40391 40392 42538f 16 API calls 40313->40392 40393 42453e 123 API calls 40313->40393 40314->40313 40315 4375bc 40317 415c7d 16 API calls 40315->40317 40318 4375d2 40317->40318 40320 4442e6 11 API calls 40318->40320 40340 4373a7 40318->40340 40319->40313 40321 4375e2 40320->40321 40321->40340 40396 444283 13 API calls 40321->40396 40323->40313 40394 42453e 123 API calls 40326->40394 40329 4375f4 40332 437620 40329->40332 40333 43760b 40329->40333 40331 43759f 40334 416935 16 API calls 40331->40334 40336 416935 16 API calls 40332->40336 40397 444283 13 API calls 40333->40397 40334->40338 40336->40340 40338->40315 40395 42453e 123 API calls 40338->40395 40339 437612 memcpy 40339->40340 40340->40275 40341->40313 40342->40259 40343->40279 40344->40276 40345->40259 40346->40283 40347->40293 40348->40289 40349->40283 40350->40283 40352 41bc3b 101 API calls 40351->40352 40353 41f1b4 40352->40353 40354 41edad 86 API calls 40353->40354 40361 41f282 40353->40361 40355 41f1cb 40354->40355 40356 41f1f5 memcmp 40355->40356 40357 41f20e 40355->40357 40355->40361 40356->40357 40358 41f21b memcmp 40357->40358 40357->40361 40359 41f326 40358->40359 40362 41f23d 40358->40362 40360 41ee6b 86 API calls 40359->40360 40359->40361 40360->40361 40361->40302 40362->40359 40363 41f28e memcmp 40362->40363 40365 41c8df 56 API calls 40362->40365 40363->40359 40364 41f2a9 40363->40364 40364->40359 40367 41f308 40364->40367 40368 41f2d8 40364->40368 40366 41f269 40365->40366 40366->40359 40369 41f287 40366->40369 40370 41f27a 40366->40370 40367->40359 40374 4446ce 11 API calls 40367->40374 40371 41ee6b 86 API calls 40368->40371 40369->40363 40372 41ee6b 86 API calls 40370->40372 40373 41f2e0 40371->40373 40372->40361 40375 41b1ca memset 40373->40375 40374->40359 40375->40361 40376->40302 40377->40302 40378->40302 40379->40296 40380->40297 40382 417044 40381->40382 40383 41705c 40381->40383 40385 416760 11 API calls 40382->40385 40387 417055 40382->40387 40384 417075 40383->40384 40386 41707a 11 API calls 40383->40386 40384->40308 40385->40387 40386->40382 40387->40308 40388->40340 40389->40313 40390->40313 40391->40313 40392->40313 40393->40313 40394->40331 40395->40315 40396->40329 40397->40339 40403 415cfe 40398->40403 40408 415d23 __aullrem __aulldvrm 40403->40408 40410 41628e 40403->40410 40404 4163ca 40417 416422 11 API calls 40404->40417 40406 416172 memset 40406->40408 40407 416422 10 API calls 40407->40408 40408->40404 40408->40406 40408->40407 40409 415cb9 10 API calls 40408->40409 40408->40410 40409->40408 40411 416520 40410->40411 40412 416527 40411->40412 40416 416574 40411->40416 40414 416544 40412->40414 40412->40416 40418 4156aa 11 API calls 40412->40418 40415 416561 memcpy 40414->40415 40414->40416 40415->40416 40416->40212 40417->40410 40418->40414 40450 41493c EnumResourceNamesW 37677 4287c1 37678 4287d2 37677->37678 37679 429ac1 37677->37679 37680 428818 37678->37680 37681 42881f 37678->37681 37687 425711 37678->37687 37692 425ad6 37679->37692 37747 415c56 11 API calls 37679->37747 37714 42013a 37680->37714 37742 420244 97 API calls 37681->37742 37686 4260dd 37741 424251 120 API calls 37686->37741 37687->37679 37689 4259da 37687->37689 37695 422aeb memset memcpy memcpy 37687->37695 37696 429a4d 37687->37696 37699 4260a1 37687->37699 37710 4259c2 37687->37710 37713 425a38 37687->37713 37730 4227f0 memset memcpy 37687->37730 37731 422b84 15 API calls 37687->37731 37732 422b5d memset memcpy memcpy 37687->37732 37733 422640 13 API calls 37687->37733 37735 4241fc 11 API calls 37687->37735 37736 42413a 90 API calls 37687->37736 37740 416760 11 API calls 37689->37740 37695->37687 37697 429a66 37696->37697 37701 429a9b 37696->37701 37743 415c56 11 API calls 37697->37743 37739 415c56 11 API calls 37699->37739 37702 429a96 37701->37702 37745 416760 11 API calls 37701->37745 37746 424251 120 API calls 37702->37746 37705 429a7a 37744 416760 11 API calls 37705->37744 37710->37692 37734 415c56 11 API calls 37710->37734 37713->37710 37737 422640 13 API calls 37713->37737 37738 4226e0 12 API calls 37713->37738 37715 42014c 37714->37715 37718 420151 37714->37718 37757 41e466 97 API calls 37715->37757 37717 420162 37717->37687 37718->37717 37719 4201b3 37718->37719 37720 420229 37718->37720 37721 4201b8 37719->37721 37722 4201dc 37719->37722 37720->37717 37723 41fd5e 86 API calls 37720->37723 37748 41fbdb 37721->37748 37722->37717 37726 4201ff 37722->37726 37754 41fc4c 37722->37754 37723->37717 37726->37717 37729 42013a 97 API calls 37726->37729 37729->37717 37730->37687 37731->37687 37732->37687 37733->37687 37734->37689 37735->37687 37736->37687 37737->37713 37738->37713 37739->37689 37740->37686 37741->37692 37742->37687 37743->37705 37744->37702 37745->37702 37746->37679 37747->37689 37749 41fbf1 37748->37749 37750 41fbf8 37748->37750 37753 41fc39 37749->37753 37772 4446ce 11 API calls 37749->37772 37762 41ee26 37750->37762 37753->37717 37758 41fd5e 37753->37758 37755 41ee6b 86 API calls 37754->37755 37756 41fc5d 37755->37756 37756->37722 37757->37718 37760 41fd65 37758->37760 37759 41fdab 37759->37717 37760->37759 37761 41fbdb 86 API calls 37760->37761 37761->37760 37763 41ee41 37762->37763 37764 41ee32 37762->37764 37773 41edad 37763->37773 37776 4446ce 11 API calls 37764->37776 37767 41ee3c 37767->37749 37770 41ee58 37770->37767 37778 41ee6b 37770->37778 37772->37753 37782 41be52 37773->37782 37776->37767 37777 41eb85 11 API calls 37777->37770 37779 41ee70 37778->37779 37780 41ee78 37778->37780 37835 41bf99 86 API calls 37779->37835 37780->37767 37783 41be6f 37782->37783 37784 41be5f 37782->37784 37790 41be8c 37783->37790 37814 418c63 memset memset 37783->37814 37813 4446ce 11 API calls 37784->37813 37787 41be69 37787->37767 37787->37777 37788 41bee7 37788->37787 37818 41a453 86 API calls 37788->37818 37790->37787 37790->37788 37791 41bf3a 37790->37791 37794 41bed1 37790->37794 37817 4446ce 11 API calls 37791->37817 37793 41bef0 37793->37788 37796 41bf01 37793->37796 37794->37793 37797 41bee2 37794->37797 37795 41bf24 memset 37795->37787 37796->37795 37798 41bf14 37796->37798 37815 418a6d memset memcpy memset 37796->37815 37803 41ac13 37797->37803 37816 41a223 memset memcpy memset 37798->37816 37802 41bf20 37802->37795 37804 41ac52 37803->37804 37805 41ac3f memset 37803->37805 37808 41ac6a 37804->37808 37819 41dc14 19 API calls 37804->37819 37806 41acd9 37805->37806 37806->37788 37810 41aca1 37808->37810 37820 41519d 37808->37820 37810->37806 37811 41acc0 memset 37810->37811 37812 41accd memcpy 37810->37812 37811->37806 37812->37806 37813->37787 37814->37790 37815->37798 37816->37802 37817->37788 37819->37808 37823 4175ed 37820->37823 37831 417570 SetFilePointer 37823->37831 37826 41760a ReadFile 37827 417637 37826->37827 37828 417627 GetLastError 37826->37828 37829 4151b3 37827->37829 37830 41763e memset 37827->37830 37828->37829 37829->37810 37830->37829 37832 4175b2 37831->37832 37833 41759c GetLastError 37831->37833 37832->37826 37832->37829 37833->37832 37834 4175a8 GetLastError 37833->37834 37834->37832 37835->37780 37836 417bc5 37838 417c61 37836->37838 37842 417bda 37836->37842 37837 417bf6 UnmapViewOfFile CloseHandle 37837->37837 37837->37842 37840 417c2c 37840->37842 37848 41851e 20 API calls 37840->37848 37842->37837 37842->37838 37842->37840 37843 4175b7 37842->37843 37844 4175d6 FindCloseChangeNotification 37843->37844 37845 4175c8 37844->37845 37846 4175df 37844->37846 37845->37846 37847 4175ce Sleep 37845->37847 37846->37842 37847->37844 37848->37840 39892 4147f3 39895 414561 39892->39895 39894 414813 39896 41456d 39895->39896 39897 41457f GetPrivateProfileIntW 39895->39897 39900 4143f1 memset _itow WritePrivateProfileStringW 39896->39900 39897->39894 39899 41457a 39899->39894 39900->39899

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 39 44558e-445594 call 444b06 4->39 40 44557e-44558c call 4136c0 call 41366b 4->40 16 4455e5 5->16 17 4455e8-4455f9 5->17 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 19 445861-445874 call 40a889 call 403c9c 13->19 20 4458ac-4458b5 13->20 42 445823-445826 14->42 16->17 24 445672-445683 call 40a889 call 403fbe 17->24 25 4455fb-445601 17->25 50 445879-44587c 19->50 26 44594f-445958 20->26 27 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 20->27 84 445685 24->84 85 4456b2-4456b5 call 40b1ab 24->85 28 445605-445607 25->28 29 445603 25->29 35 4459f2-4459fa 26->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 26->36 135 44592d-445945 call 40b6ef 27->135 136 44594a 27->136 28->24 38 445609-44560d 28->38 29->28 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->24 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 39->3 40->39 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 50->64 65 44587e 50->65 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 73 445fae-445fb2 60->73 74 445d2b-445d3b 60->74 168 445cf5 61->168 169 445cfc-445d03 61->169 64->20 82 445884-44589d call 40a9b5 call 4087b3 65->82 138 445849 66->138 247 445c77 67->247 68->67 83 445ba2-445bcf call 4099c6 call 445403 call 445389 68->83 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->90 156 44589f 82->156 83->53 99 44568b-4456a4 call 40a9b5 call 4087b3 84->99 116 4456ba-4456c4 85->116 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 117 4457f9 116->117 118 4456ca-4456d3 call 413cfa call 413d4c 116->118 117->6 172 4456d8-4456f7 call 40b2cc call 413fa6 118->172 135->136 136->26 138->51 150->116 151->150 153->154 154->35 156->64 158->85 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->73 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                  APIs
                  • memset.MSVCRT ref: 004455C2
                  • wcsrchr.MSVCRT ref: 004455DA
                  • memset.MSVCRT ref: 0044570D
                  • memset.MSVCRT ref: 00445725
                    • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                    • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                    • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                    • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                    • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                    • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                    • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                    • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                  • memset.MSVCRT ref: 0044573D
                  • memset.MSVCRT ref: 00445755
                  • memset.MSVCRT ref: 004458CB
                  • memset.MSVCRT ref: 004458E3
                  • memset.MSVCRT ref: 0044596E
                  • memset.MSVCRT ref: 00445A10
                  • memset.MSVCRT ref: 00445A28
                  • memset.MSVCRT ref: 00445AC6
                    • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                    • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                    • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                    • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                    • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                  • memset.MSVCRT ref: 00445B52
                  • memset.MSVCRT ref: 00445B6A
                  • memset.MSVCRT ref: 00445C9B
                  • memset.MSVCRT ref: 00445CB3
                  • _wcsicmp.MSVCRT ref: 00445D56
                  • memset.MSVCRT ref: 00445B82
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                  • memset.MSVCRT ref: 00445986
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                  • String ID: *.*$Apple Computer\Preferences\keychain.plist
                  • API String ID: 2745753283-3798722523
                  • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                  • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                  • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                  • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f ??3@YAXPAX@Z 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                  APIs
                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                  • memset.MSVCRT ref: 0040E380
                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                    • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                  • wcschr.MSVCRT ref: 0040E3B8
                  • memcpy.MSVCRT ref: 0040E3EC
                  • memcpy.MSVCRT ref: 0040E407
                  • memcpy.MSVCRT ref: 0040E422
                  • memcpy.MSVCRT ref: 0040E43D
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                  • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                  • API String ID: 3073804840-2252543386
                  • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                  • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                  • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                  • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memcpy$memcmp$ByteCharMultiWidememset
                  • String ID:
                  • API String ID: 3715365532-3916222277
                  • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                  • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                  • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                  • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                  Control-flow Graph

                  APIs
                    • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                    • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                    • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                    • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                    • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                    • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                  • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                  • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                  • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                    • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                    • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                    • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                  • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                  • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                  • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                  • CloseHandle.KERNEL32(00000000), ref: 0040E143
                  • CloseHandle.KERNEL32(?), ref: 0040E148
                  • CloseHandle.KERNEL32(?), ref: 0040E14D
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                  • String ID: bhv
                  • API String ID: 327780389-2689659898
                  • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                  • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                  • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                  • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                  Control-flow Graph

                  APIs
                  • memset.MSVCRT ref: 0040C298
                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                  • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                  • wcschr.MSVCRT ref: 0040C324
                  • wcschr.MSVCRT ref: 0040C344
                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                  • GetLastError.KERNEL32 ref: 0040C373
                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                  • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                  • String ID: visited:
                  • API String ID: 1157525455-1702587658
                  • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                  • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                  • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                  • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 ??3@YAXPAX@Z 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                  APIs
                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                  • memset.MSVCRT ref: 0040E1BD
                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                    • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                    • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                  • _snwprintf.MSVCRT ref: 0040E257
                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                  • String ID: $ContainerId$Container_%I64d$Containers$Name
                  • API String ID: 3883404497-2982631422
                  • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                  • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                  • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                  • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError ??3@YAXPAX@Z 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 ??3@YAXPAX@Z 870->877 871->870 877->855
                  APIs
                  • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                  • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                  • GetLastError.KERNEL32 ref: 0041847E
                  • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: CreateFile$??3@ErrorLast
                  • String ID: |A
                  • API String ID: 1407640353-1717621600
                  • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                  • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                  • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                  • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                  • String ID: r!A
                  • API String ID: 2791114272-628097481
                  • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                  • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                  • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                  • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memcpy
                  • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                  • API String ID: 3510742995-2641926074
                  • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                  • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                  • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                  • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                  APIs
                    • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                    • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                    • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                  • memset.MSVCRT ref: 004033B7
                  • memcpy.MSVCRT ref: 004033D0
                  • wcscmp.MSVCRT ref: 004033FC
                  • _wcsicmp.MSVCRT ref: 00403439
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                  • String ID: $0.@
                  • API String ID: 3030842498-1896041820
                  • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                  • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                  • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                  • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                  APIs
                  • wcschr.MSVCRT ref: 00414458
                  • _snwprintf.MSVCRT ref: 0041447D
                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                  • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: PrivateProfileString$Write_snwprintfwcschr
                  • String ID: "%s"
                  • API String ID: 1343145685-3297466227
                  • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                  • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                  • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                  • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memcmp
                  • String ID: @ $SQLite format 3
                  • API String ID: 1475443563-3708268960
                  • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                  • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                  • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                  • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: _wcsicmpqsort
                  • String ID: /nosort$/sort
                  • API String ID: 1579243037-1578091866
                  • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                  • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                  • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                  • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ??2@
                  • String ID:
                  • API String ID: 1033339047-0
                  • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                  • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                  • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                  • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                  APIs
                    • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                    • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                    • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                    • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                    • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                    • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                    • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                    • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                    • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                  • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                    • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                    • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                    • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                  • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                  • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                    • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                    • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                    • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                  • String ID:
                  • API String ID: 1042154641-0
                  • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                  • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                  • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                  • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: FileFindFirst
                  • String ID: *.*$index.dat
                  • API String ID: 1974802433-2863569691
                  • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                  • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                  • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                  • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                  APIs
                  • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                  • GetLastError.KERNEL32 ref: 004175A2
                  • GetLastError.KERNEL32 ref: 004175A8
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ErrorLast$FilePointer
                  • String ID:
                  • API String ID: 1156039329-0
                  • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                  • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                  • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                  • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                  APIs
                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                  • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: File$ChangeCloseCreateFindNotificationTime
                  • String ID:
                  • API String ID: 1631957507-0
                  • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                  • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                  • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                  • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                  APIs
                  Strings
                  • failed memory resize %u to %u bytes, xrefs: 00415358
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: realloc
                  • String ID: failed memory resize %u to %u bytes
                  • API String ID: 471065373-2134078882
                  • Opcode ID: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                  • Instruction ID: af22f86c8d97814ed0bf188a45fefa7fc909daabc8cee38fca791e75313f3e85
                  • Opcode Fuzzy Hash: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                  • Instruction Fuzzy Hash: 49F027B3A01605A7D2109A55DC418CBF3DCDFC4655B06082FF998D3201E168E88083B6
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID:
                  • String ID: d
                  • API String ID: 0-2564639436
                  • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                  • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                  • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                  • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                  APIs
                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                  • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                    • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                    • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                    • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                  • String ID:
                  • API String ID: 1161345128-0
                  • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                  • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                  • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                  • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                  APIs
                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                  • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                  • String ID:
                  • API String ID: 3150196962-0
                  • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                  • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                  • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                  • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                  APIs
                  Strings
                  • failed to allocate %u bytes of memory, xrefs: 004152F0
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: malloc
                  • String ID: failed to allocate %u bytes of memory
                  • API String ID: 2803490479-1168259600
                  • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                  • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                  • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                  • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                  • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                  • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                  • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memcpymemset
                  • String ID:
                  • API String ID: 1297977491-0
                  • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                  • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                  • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                  • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                  APIs
                  • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: File$PointerRead
                  • String ID:
                  • API String ID: 3154509469-0
                  • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                  • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                  • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                  • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                  APIs
                  • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                    • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                    • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                    • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: PrivateProfile$StringWrite_itowmemset
                  • String ID:
                  • API String ID: 4232544981-0
                  • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                  • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                  • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                  • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                  APIs
                  • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: FileRead
                  • String ID:
                  • API String ID: 2738559852-0
                  • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                  • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                  • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                  • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                  APIs
                  • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: FileWrite
                  • String ID:
                  • API String ID: 3934441357-0
                  • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                  • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                  • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                  • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                  • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                  • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                  • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: ??3@
                  • String ID:
                  • API String ID: 613200358-0
                  • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                  • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                  • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                  • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                  APIs
                  • memset.MSVCRT ref: 00445426
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                  • String ID:
                  • API String ID: 1828521557-0
                  • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                  • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                  • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                  • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                  APIs
                    • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                  • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                  Memory Dump Source
                  • Source File: 00000005.00000002.2094871798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_400000_rYhL.jbxd
                  Similarity
                  • API ID: File$CloseCreateErrorHandleLastRead
                  • String ID:
                  • API String ID: 2136311172-0
                  • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                  • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                  • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                  • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E