Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quote.exe

Overview

General Information

Sample name:Quote.exe
Analysis ID:1519453
MD5:0b18de9b2b7f17fc93796eabee8d26dd
SHA1:0c0f08a2df8262960e6290900bff0684847cc0c8
SHA256:929167f47e1116759145eb457f86474a311374373b05b11438ea1222a9e2a8f0
Tags:exeuser-TeamDreier
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • Quote.exe (PID: 1232 cmdline: "C:\Users\user\Desktop\Quote.exe" MD5: 0B18DE9B2B7F17FC93796EABEE8D26DD)
    • powershell.exe (PID: 5068 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5744 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 5736 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Quote.exe (PID: 5608 cmdline: "C:\Users\user\Desktop\Quote.exe" MD5: 0B18DE9B2B7F17FC93796EABEE8D26DD)
  • OlhQyptevOgDP.exe (PID: 5060 cmdline: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe MD5: 0B18DE9B2B7F17FC93796EABEE8D26DD)
    • schtasks.exe (PID: 912 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • OlhQyptevOgDP.exe (PID: 5220 cmdline: "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe" MD5: 0B18DE9B2B7F17FC93796EABEE8D26DD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "www.projectusf.com:2404:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-J91LMC", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\gfh\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.1577837747.0000000001087000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              Click to see the 23 entries
              SourceRuleDescriptionAuthorStrings
              12.2.OlhQyptevOgDP.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                12.2.OlhQyptevOgDP.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  12.2.OlhQyptevOgDP.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    12.2.OlhQyptevOgDP.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6c4b8:$a1: Remcos restarted by watchdog!
                    • 0x6ca30:$a3: %02i:%02i:%02i:%03i
                    12.2.OlhQyptevOgDP.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x6657c:$str_b2: Executing file:
                    • 0x675fc:$str_b3: GetDirectListeningPort
                    • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x67128:$str_b7: \update.vbs
                    • 0x665a4:$str_b9: Downloaded file:
                    • 0x66590:$str_b10: Downloading file:
                    • 0x66634:$str_b12: Failed to upload file:
                    • 0x675c4:$str_b13: StartForward
                    • 0x675e4:$str_b14: StopForward
                    • 0x67080:$str_b15: fso.DeleteFile "
                    • 0x67014:$str_b16: On Error Resume Next
                    • 0x670b0:$str_b17: fso.DeleteFolder "
                    • 0x66624:$str_b18: Uploaded file:
                    • 0x665e4:$str_b19: Unable to delete:
                    • 0x67048:$str_b20: while fso.FileExists("
                    • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 29 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote.exe", ParentImage: C:\Users\user\Desktop\Quote.exe, ParentProcessId: 1232, ParentProcessName: Quote.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", ProcessId: 5068, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote.exe", ParentImage: C:\Users\user\Desktop\Quote.exe, ParentProcessId: 1232, ParentProcessName: Quote.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", ProcessId: 5068, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe, ParentImage: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe, ParentProcessId: 5060, ParentProcessName: OlhQyptevOgDP.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp", ProcessId: 912, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote.exe", ParentImage: C:\Users\user\Desktop\Quote.exe, ParentProcessId: 1232, ParentProcessName: Quote.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp", ProcessId: 5736, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote.exe", ParentImage: C:\Users\user\Desktop\Quote.exe, ParentProcessId: 1232, ParentProcessName: Quote.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe", ProcessId: 5068, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote.exe", ParentImage: C:\Users\user\Desktop\Quote.exe, ParentProcessId: 1232, ParentProcessName: Quote.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp", ProcessId: 5736, ProcessName: schtasks.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Registry Key setAuthor: Joe Security: Data: Details: 5E 07 88 10 1C 80 39 5C 23 05 E8 07 49 25 7C 2E 79 67 12 A9 33 AC 0D 2E 0C 28 AD 85 01 65 34 11 24 79 EA BB B2 86 65 BC 0B 76 80 22 BC AA CB 28 B4 99 B4 D7 0F 71 67 45 30 87 9D 74 F9 DB 4B 0F A3 9B , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Quote.exe, ProcessId: 5608, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-J91LMC\exepath
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T15:10:41.513123+020020327761Malware Command and Control Activity Detected192.168.2.1149703103.186.117.772404TCP
                    2024-09-26T15:10:44.607768+020020327761Malware Command and Control Activity Detected192.168.2.1149706103.186.117.772404TCP
                    2024-09-26T15:10:47.685249+020020327761Malware Command and Control Activity Detected192.168.2.1149708103.186.117.772404TCP
                    2024-09-26T15:10:50.764599+020020327761Malware Command and Control Activity Detected192.168.2.1149709103.186.117.772404TCP
                    2024-09-26T15:10:53.851235+020020327761Malware Command and Control Activity Detected192.168.2.1149710103.186.117.772404TCP
                    2024-09-26T15:10:56.918605+020020327761Malware Command and Control Activity Detected192.168.2.1149712103.186.117.772404TCP
                    2024-09-26T15:10:59.996716+020020327761Malware Command and Control Activity Detected192.168.2.1149716103.186.117.772404TCP
                    2024-09-26T15:11:03.090663+020020327761Malware Command and Control Activity Detected192.168.2.1163278103.186.117.772404TCP
                    2024-09-26T15:11:06.152406+020020327761Malware Command and Control Activity Detected192.168.2.1161714103.186.117.772404TCP
                    2024-09-26T15:11:09.246828+020020327761Malware Command and Control Activity Detected192.168.2.1161716103.186.117.772404TCP
                    2024-09-26T15:11:12.324184+020020327761Malware Command and Control Activity Detected192.168.2.1161717103.186.117.772404TCP
                    2024-09-26T15:11:15.418309+020020327761Malware Command and Control Activity Detected192.168.2.1161718103.186.117.772404TCP
                    2024-09-26T15:11:18.480623+020020327761Malware Command and Control Activity Detected192.168.2.1161719103.186.117.772404TCP
                    2024-09-26T15:11:21.559243+020020327761Malware Command and Control Activity Detected192.168.2.1161720103.186.117.772404TCP
                    2024-09-26T15:11:24.621137+020020327761Malware Command and Control Activity Detected192.168.2.1161721103.186.117.772404TCP
                    2024-09-26T15:11:27.716539+020020327761Malware Command and Control Activity Detected192.168.2.1161722103.186.117.772404TCP
                    2024-09-26T15:11:30.796708+020020327761Malware Command and Control Activity Detected192.168.2.1161723103.186.117.772404TCP
                    2024-09-26T15:11:33.871806+020020327761Malware Command and Control Activity Detected192.168.2.1161724103.186.117.772404TCP
                    2024-09-26T15:11:36.934060+020020327761Malware Command and Control Activity Detected192.168.2.1161725103.186.117.772404TCP
                    2024-09-26T15:11:40.029058+020020327761Malware Command and Control Activity Detected192.168.2.1161726103.186.117.772404TCP
                    2024-09-26T15:11:43.282974+020020327761Malware Command and Control Activity Detected192.168.2.1161727103.186.117.772404TCP
                    2024-09-26T15:11:46.371166+020020327761Malware Command and Control Activity Detected192.168.2.1161728103.186.117.772404TCP
                    2024-09-26T15:11:49.465456+020020327761Malware Command and Control Activity Detected192.168.2.1161729103.186.117.772404TCP
                    2024-09-26T15:11:52.542714+020020327761Malware Command and Control Activity Detected192.168.2.1161730103.186.117.772404TCP
                    2024-09-26T15:11:55.623424+020020327761Malware Command and Control Activity Detected192.168.2.1161731103.186.117.772404TCP
                    2024-09-26T15:11:58.700002+020020327761Malware Command and Control Activity Detected192.168.2.1161732103.186.117.772404TCP
                    2024-09-26T15:12:01.784613+020020327761Malware Command and Control Activity Detected192.168.2.1161733103.186.117.772404TCP
                    2024-09-26T15:12:04.905433+020020327761Malware Command and Control Activity Detected192.168.2.1161734103.186.117.772404TCP
                    2024-09-26T15:12:07.997419+020020327761Malware Command and Control Activity Detected192.168.2.1161735103.186.117.772404TCP
                    2024-09-26T15:12:11.074219+020020327761Malware Command and Control Activity Detected192.168.2.1161736103.186.117.772404TCP
                    2024-09-26T15:12:14.319376+020020327761Malware Command and Control Activity Detected192.168.2.1161737103.186.117.772404TCP
                    2024-09-26T15:12:17.496002+020020327761Malware Command and Control Activity Detected192.168.2.1161738103.186.117.772404TCP
                    2024-09-26T15:12:20.590429+020020327761Malware Command and Control Activity Detected192.168.2.1161739103.186.117.772404TCP
                    2024-09-26T15:12:23.652562+020020327761Malware Command and Control Activity Detected192.168.2.1161740103.186.117.772404TCP
                    2024-09-26T15:12:26.701177+020020327761Malware Command and Control Activity Detected192.168.2.1161741103.186.117.772404TCP
                    2024-09-26T15:12:29.683564+020020327761Malware Command and Control Activity Detected192.168.2.1161742103.186.117.772404TCP
                    2024-09-26T15:12:32.699538+020020327761Malware Command and Control Activity Detected192.168.2.1161743103.186.117.772404TCP
                    2024-09-26T15:12:35.922652+020020327761Malware Command and Control Activity Detected192.168.2.1161744103.186.117.772404TCP
                    2024-09-26T15:12:38.871083+020020327761Malware Command and Control Activity Detected192.168.2.1161745103.186.117.772404TCP
                    2024-09-26T15:12:41.917890+020020327761Malware Command and Control Activity Detected192.168.2.1161746103.186.117.772404TCP
                    2024-09-26T15:12:44.763088+020020327761Malware Command and Control Activity Detected192.168.2.1161747103.186.117.772404TCP
                    2024-09-26T15:12:47.590174+020020327761Malware Command and Control Activity Detected192.168.2.1161748103.186.117.772404TCP
                    2024-09-26T15:12:50.402177+020020327761Malware Command and Control Activity Detected192.168.2.1161749103.186.117.772404TCP
                    2024-09-26T15:12:53.245954+020020327761Malware Command and Control Activity Detected192.168.2.1161750103.186.117.772404TCP
                    2024-09-26T15:12:56.136777+020020327761Malware Command and Control Activity Detected192.168.2.1161751103.186.117.772404TCP
                    2024-09-26T15:12:58.855553+020020327761Malware Command and Control Activity Detected192.168.2.1161752103.186.117.772404TCP
                    2024-09-26T15:13:01.560564+020020327761Malware Command and Control Activity Detected192.168.2.1161753103.186.117.772404TCP
                    2024-09-26T15:13:04.324100+020020327761Malware Command and Control Activity Detected192.168.2.1161754103.186.117.772404TCP
                    2024-09-26T15:13:06.965626+020020327761Malware Command and Control Activity Detected192.168.2.1161755103.186.117.772404TCP
                    2024-09-26T15:13:09.623845+020020327761Malware Command and Control Activity Detected192.168.2.1161756103.186.117.772404TCP
                    2024-09-26T15:13:12.340039+020020327761Malware Command and Control Activity Detected192.168.2.1161757103.186.117.772404TCP
                    2024-09-26T15:13:15.029131+020020327761Malware Command and Control Activity Detected192.168.2.1161758103.186.117.772404TCP
                    2024-09-26T15:13:17.824111+020020327761Malware Command and Control Activity Detected192.168.2.1161759103.186.117.772404TCP
                    2024-09-26T15:13:20.661150+020020327761Malware Command and Control Activity Detected192.168.2.1161760103.186.117.772404TCP
                    2024-09-26T15:13:23.214863+020020327761Malware Command and Control Activity Detected192.168.2.1161761103.186.117.772404TCP
                    2024-09-26T15:13:25.811539+020020327761Malware Command and Control Activity Detected192.168.2.1161762103.186.117.772404TCP
                    2024-09-26T15:13:28.343466+020020327761Malware Command and Control Activity Detected192.168.2.1161763103.186.117.772404TCP
                    2024-09-26T15:13:30.871590+020020327761Malware Command and Control Activity Detected192.168.2.1161764103.186.117.772404TCP
                    2024-09-26T15:13:33.497554+020020327761Malware Command and Control Activity Detected192.168.2.1161765103.186.117.772404TCP
                    2024-09-26T15:13:35.985543+020020327761Malware Command and Control Activity Detected192.168.2.1161766103.186.117.772404TCP
                    2024-09-26T15:13:38.449607+020020327761Malware Command and Control Activity Detected192.168.2.1161767103.186.117.772404TCP
                    2024-09-26T15:13:40.886683+020020327761Malware Command and Control Activity Detected192.168.2.1161768103.186.117.772404TCP
                    2024-09-26T15:13:43.383296+020020327761Malware Command and Control Activity Detected192.168.2.1161769103.186.117.772404TCP
                    2024-09-26T15:13:45.793483+020020327761Malware Command and Control Activity Detected192.168.2.1161770103.186.117.772404TCP
                    2024-09-26T15:13:48.199479+020020327761Malware Command and Control Activity Detected192.168.2.1161771103.186.117.772404TCP
                    2024-09-26T15:13:50.590644+020020327761Malware Command and Control Activity Detected192.168.2.1161772103.186.117.772404TCP
                    2024-09-26T15:13:52.997513+020020327761Malware Command and Control Activity Detected192.168.2.1161773103.186.117.772404TCP
                    2024-09-26T15:13:55.371810+020020327761Malware Command and Control Activity Detected192.168.2.1161774103.186.117.772404TCP
                    2024-09-26T15:13:57.746682+020020327761Malware Command and Control Activity Detected192.168.2.1161775103.186.117.772404TCP
                    2024-09-26T15:14:00.091617+020020327761Malware Command and Control Activity Detected192.168.2.1161776103.186.117.772404TCP
                    2024-09-26T15:14:02.479999+020020327761Malware Command and Control Activity Detected192.168.2.1161777103.186.117.772404TCP
                    2024-09-26T15:14:04.808996+020020327761Malware Command and Control Activity Detected192.168.2.1161778103.186.117.772404TCP
                    2024-09-26T15:14:07.153196+020020327761Malware Command and Control Activity Detected192.168.2.1161779103.186.117.772404TCP
                    2024-09-26T15:14:09.480523+020020327761Malware Command and Control Activity Detected192.168.2.1161780103.186.117.772404TCP
                    2024-09-26T15:14:11.794658+020020327761Malware Command and Control Activity Detected192.168.2.1161781103.186.117.772404TCP
                    2024-09-26T15:14:14.105754+020020327761Malware Command and Control Activity Detected192.168.2.1161782103.186.117.772404TCP
                    2024-09-26T15:14:16.419342+020020327761Malware Command and Control Activity Detected192.168.2.1161783103.186.117.772404TCP
                    2024-09-26T15:14:18.762002+020020327761Malware Command and Control Activity Detected192.168.2.1161784103.186.117.772404TCP
                    2024-09-26T15:14:21.047770+020020327761Malware Command and Control Activity Detected192.168.2.1161785103.186.117.772404TCP
                    2024-09-26T15:14:23.342991+020020327761Malware Command and Control Activity Detected192.168.2.1161786103.186.117.772404TCP
                    2024-09-26T15:14:25.605662+020020327761Malware Command and Control Activity Detected192.168.2.1161787103.186.117.772404TCP
                    2024-09-26T15:14:27.855528+020020327761Malware Command and Control Activity Detected192.168.2.1161788103.186.117.772404TCP
                    2024-09-26T15:14:30.371666+020020327761Malware Command and Control Activity Detected192.168.2.1161789103.186.117.772404TCP
                    2024-09-26T15:14:32.637050+020020327761Malware Command and Control Activity Detected192.168.2.1161790103.186.117.772404TCP
                    2024-09-26T15:14:34.889651+020020327761Malware Command and Control Activity Detected192.168.2.1161791103.186.117.772404TCP
                    2024-09-26T15:14:37.138746+020020327761Malware Command and Control Activity Detected192.168.2.1161792103.186.117.772404TCP
                    2024-09-26T15:14:39.371649+020020327761Malware Command and Control Activity Detected192.168.2.1161793103.186.117.772404TCP
                    2024-09-26T15:14:41.639740+020020327761Malware Command and Control Activity Detected192.168.2.1161794103.186.117.772404TCP
                    2024-09-26T15:14:43.871582+020020327761Malware Command and Control Activity Detected192.168.2.1161795103.186.117.772404TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: www.projectusf.comAvira URL Cloud: Label: malware
                    Source: 0000000C.00000002.1577837747.0000000001087000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "www.projectusf.com:2404:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-J91LMC", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1577837747.0000000001087000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 5608, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\gfh\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeJoe Sandbox ML: detected
                    Source: Quote.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_004338C8
                    Source: Quote.exe, 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_428584ee-b

                    Exploits

                    barindex
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00407538 _wcslen,CoGetObject,12_2_00407538
                    Source: Quote.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Quote.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: yQev.pdbSHA256 source: Quote.exe, OlhQyptevOgDP.exe.0.dr
                    Source: Binary string: yQev.pdb source: Quote.exe, OlhQyptevOgDP.exe.0.dr
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_0040928E
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,12_2_0041C322
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,12_2_0040C388
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_004096A0
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,12_2_00408847
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00407877 FindFirstFileW,FindNextFileW,12_2_00407877
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0044E8F9 FindFirstFileExA,12_2_0044E8F9
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040BB6B
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419B86
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040BD72
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407CD2
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 4x nop then inc dword ptr [ebp-0Ch]0_2_054E5454
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 4x nop then jmp 0733432Bh0_2_07333A0D

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:49709 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:49708 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:49703 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61714 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:49716 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61719 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:63278 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61725 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61720 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61716 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61723 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61727 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61724 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61731 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61718 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61735 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61729 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61730 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61737 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61742 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61739 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61738 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61745 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61732 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61743 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61750 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61753 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61722 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61747 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61765 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61748 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61754 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61744 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61758 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61763 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61757 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61752 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61760 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61766 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61749 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61755 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:49712 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61733 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61759 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61769 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61751 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61721 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61761 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61770 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61756 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61728 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61768 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61774 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61762 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61775 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:49710 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61779 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61780 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61771 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61781 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61740 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61783 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61786 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61734 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61776 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61792 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61785 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61764 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61778 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61790 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61767 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61777 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61784 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61793 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61795 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61726 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61794 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61772 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61788 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61741 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:49706 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61782 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61746 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61773 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61789 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61791 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61787 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61736 -> 103.186.117.77:2404
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.11:61717 -> 103.186.117.77:2404
                    Source: Malware configuration extractorURLs: www.projectusf.com
                    Source: global trafficTCP traffic: 192.168.2.11:49703 -> 103.186.117.77:2404
                    Source: Joe Sandbox ViewASN Name: AARNET-AS-APAustralianAcademicandResearchNetworkAARNe AARNET-AS-APAustralianAcademicandResearchNetworkAARNe
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,12_2_0041B411
                    Source: global trafficDNS traffic detected: DNS query: www.projectusf.com
                    Source: OlhQyptevOgDP.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: Quote.exe, 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, Quote.exe, 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, OlhQyptevOgDP.exe, 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: Quote.exe, 00000000.00000002.1537902992.0000000002EF3000.00000004.00000800.00020000.00000000.sdmp, OlhQyptevOgDP.exe, 00000008.00000002.1579344837.0000000002CD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000012_2_0040A2F3
                    Source: C:\Users\user\Desktop\Quote.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Quote.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B749
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004168FC
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B749
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,12_2_0040A41B
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1577837747.0000000001087000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 5608, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\gfh\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041CA73 SystemParametersInfoW,12_2_0041CA73

                    System Summary

                    barindex
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Users\user\Desktop\Quote.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,12_2_004167EF
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_0140DF9C0_2_0140DF9C
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054B82F80_2_054B82F8
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054B05080_2_054B0508
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054B05180_2_054B0518
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054B82EA0_2_054B82EA
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054E5B970_2_054E5B97
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054E5BA80_2_054E5BA8
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_07335D180_2_07335D18
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_073300060_2_07330006
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_073300400_2_07330040
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 8_2_02B353388_2_02B35338
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 8_2_02B3DF9C8_2_02B3DF9C
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043706A12_2_0043706A
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041400512_2_00414005
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043E11C12_2_0043E11C
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004541D912_2_004541D9
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004381E812_2_004381E8
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041F18B12_2_0041F18B
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0044627012_2_00446270
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043E34B12_2_0043E34B
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004533AB12_2_004533AB
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0042742E12_2_0042742E
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043756612_2_00437566
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043E5A812_2_0043E5A8
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004387F012_2_004387F0
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043797E12_2_0043797E
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004339D712_2_004339D7
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0044DA4912_2_0044DA49
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00427AD712_2_00427AD7
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041DBF312_2_0041DBF3
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00427C4012_2_00427C40
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00437DB312_2_00437DB3
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00435EEB12_2_00435EEB
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043DEED12_2_0043DEED
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00426E9F12_2_00426E9F
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: String function: 00401E65 appears 34 times
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: String function: 00434E70 appears 54 times
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: String function: 00434801 appears 41 times
                    Source: Quote.exe, 00000000.00000000.1517836254.0000000000B78000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameyQev.exeb! vs Quote.exe
                    Source: Quote.exe, 00000000.00000002.1536367796.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quote.exe
                    Source: Quote.exe, 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Quote.exe
                    Source: Quote.exe, 00000000.00000002.1545083078.0000000007CE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Quote.exe
                    Source: Quote.exeBinary or memory string: OriginalFilenameyQev.exeb! vs Quote.exe
                    Source: Quote.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Quote.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: OlhQyptevOgDP.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, cITOTbwNwgCoi63fbi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, MICngcRpWAq1Ca3BEG.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, MICngcRpWAq1Ca3BEG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, MICngcRpWAq1Ca3BEG.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, MICngcRpWAq1Ca3BEG.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, MICngcRpWAq1Ca3BEG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, MICngcRpWAq1Ca3BEG.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, cITOTbwNwgCoi63fbi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@16/12@1/1
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,12_2_0041798D
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,12_2_0040F4AF
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,12_2_0041B539
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AADB
                    Source: C:\Users\user\Desktop\Quote.exeFile created: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4220:120:WilError_03
                    Source: C:\Users\user\Desktop\Quote.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-J91LMC
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6176:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5380:120:WilError_03
                    Source: C:\Users\user\Desktop\Quote.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCCF1.tmpJump to behavior
                    Source: Quote.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Quote.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Quote.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeFile read: C:\Users\user\Desktop\Quote.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Quote.exe "C:\Users\user\Desktop\Quote.exe"
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Users\user\Desktop\Quote.exe "C:\Users\user\Desktop\Quote.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess created: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Users\user\Desktop\Quote.exe "C:\Users\user\Desktop\Quote.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess created: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Quote.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Quote.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Quote.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Quote.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: yQev.pdbSHA256 source: Quote.exe, OlhQyptevOgDP.exe.0.dr
                    Source: Binary string: yQev.pdb source: Quote.exe, OlhQyptevOgDP.exe.0.dr

                    Data Obfuscation

                    barindex
                    Source: Quote.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: OlhQyptevOgDP.exe.0.dr, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Quote.exe.2ed6ba8.3.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Quote.exe.2ec7f10.2.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Quote.exe.2f1643c.1.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Quote.exe.2f25738.0.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Quote.exe.5870000.7.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, MICngcRpWAq1Ca3BEG.cs.Net Code: zop27W3rxY System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, MICngcRpWAq1Ca3BEG.cs.Net Code: zop27W3rxY System.Reflection.Assembly.Load(byte[])
                    Source: 8.2.OlhQyptevOgDP.exe.2ca7f64.2.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 8.2.OlhQyptevOgDP.exe.2d05898.3.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CBE1
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054ED139 push 84058447h; iretd 0_2_054ED145
                    Source: C:\Users\user\Desktop\Quote.exeCode function: 0_2_054EFEA8 push eax; mov dword ptr [esp], ecx0_2_054EFEBC
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00457186 push ecx; ret 12_2_00457199
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0045E55D push esi; ret 12_2_0045E566
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00457AA8 push eax; ret 12_2_00457AC6
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00434EB6 push ecx; ret 12_2_00434EC9
                    Source: Quote.exeStatic PE information: section name: .text entropy: 7.889628616904563
                    Source: OlhQyptevOgDP.exe.0.drStatic PE information: section name: .text entropy: 7.889628616904563
                    Source: 0.2.Quote.exe.2ed6ba8.3.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Quote.exe.2ed6ba8.3.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Quote.exe.2ec7f10.2.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Quote.exe.2ec7f10.2.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Quote.exe.2f1643c.1.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Quote.exe.2f1643c.1.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Quote.exe.2f25738.0.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Quote.exe.2f25738.0.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Quote.exe.5870000.7.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Quote.exe.5870000.7.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, h2NAkrHjrvlIUjTpkb.csHigh entropy of concatenated method names: 'EXRrQ4t89I', 'juIr4xyF9n', 'WVXiSsSnwI', 'aDCih5dmeF', 'J4YiJAiDRP', 'Qh6ikuXxmq', 't53iyhNdTs', 'y17ijeRefC', 'GExi0gaq2a', 'jD1iAp2qK7'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, DtAqRq3rYg4Pf2uXGQ.csHigh entropy of concatenated method names: 'AVGNWUTPGM', 'ScBNuUbe6M', 'ToString', 'd4lNwBhO9N', 'L1WN6n7MQW', 'STKNiaq3aV', 'nRONrYZeKT', 'wJCNtCoCyh', 'CQnNZpfOZY', 'mOlNGVF3lg'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, pVfCDf4VtL0vGWp54M.csHigh entropy of concatenated method names: 'ToString', 'el7XpYRPJZ', 'LvWXHDg0vm', 'VkbXS9dIcR', 'sqXXhhLYQn', 'EDtXJmneSL', 'zRUXkl0a04', 'cg6Xy0vGFh', 'FpZXjTFgUe', 'I2QX0Z5WEU'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, eXxtDP6HJGrfA787cI.csHigh entropy of concatenated method names: 'rFwZww0tHd', 'GtPZii9VI2', 'bKIZtVXgoo', 'A7utFjd7g3', 'WLytz5uHqv', 'z1ZZ5RJol7', 'p86ZcEs3U8', 'l17Zn9orns', 'rIXZPMnfrt', 'wC0Z2FExhJ'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, n0n7qqvNqQBrrEjSTd.csHigh entropy of concatenated method names: 'TvJlA897aA', 'oxHlspvDfS', 'uL2lUfLROo', 'E3VlBG19xY', 'kE9lHv8yAi', 'TAmlSTAmEp', 'JCqlhNM1NQ', 'x37lJh9U2j', 'plKlknNcWp', 'ppLlyNPpJ5'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, t6vZvYtivkxEJJOkSH.csHigh entropy of concatenated method names: 'fs2tIAj2E7', 'gP3t68TDvr', 'PaItr7vhvf', 'tYatZvoPxX', 'QrHtGalEbm', 'h0PrTnfwZH', 'l2trbPM0tI', 'EpmrqdViiH', 'yS0rvgTxSq', 'EQ7rxoYCdt'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, v4WkifSdX91u7THrFb.csHigh entropy of concatenated method names: 'LvRiD3tXKk', 'ItwiK04EEj', 'oXCiC1XD4K', 'WjIiEycxDp', 'Hvbil0Cygr', 't3riXFyCAE', 'B2piNwCUbv', 'E1hieRdsmM', 'sHkidNrGpR', 'eKji8ekFcK'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, FXeblJDoq97spMkydM.csHigh entropy of concatenated method names: 'tyfcZMHyGF', 'I1CcGUV3jV', 'hhecW6h5JZ', 'sr5cuZNCnO', 'b7aclLSusv', 'd3NcXXx3FV', 'x5CdfCAaEZKFGSxf6K', 'S4FsO2L9sX8hth2s82', 'jdeccplM4x', 'KwZcPNeadM'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, H54yoGmmZymfQkQaFU.csHigh entropy of concatenated method names: 'WyINvySHLF', 'FObNFGGcUe', 'Bmde5ZUDC4', 'x1hec01Rts', 'FtaNpFtc4U', 'K6UNsYfwxf', 'kKANMPcwav', 'TYINUvesQy', 'UBsNBoddtB', 'qrMNOcjS39'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, nFwxJdfnFVUcgQ2Q9D.csHigh entropy of concatenated method names: 'kWH7r6Soq', 'MuhDtqQPp', 'fmYKdU9Y9', 'uPG4iOGFR', 'VaBEn487x', 'LHRYDu4ag', 'd5mIGZCvcoI5bMU2NU', 'YCHrE90T2mCtjoRexI', 'AEUe3SWta', 'zgs8eXCgi'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, RuUCiRqJLJ3FBvWnr4.csHigh entropy of concatenated method names: 'f3XewI8dFV', 'HtGe6uPAq2', 'j3deiYU6ar', 'DVterkSg2R', 'Ha4etimvcq', 'neOeZfZo4Y', 'sDyeGxTjbH', 'HuRem8p6lH', 'BRYeWrBT2c', 'GcMeunDDIx'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, hFiiuCca4uAnu0BvPV.csHigh entropy of concatenated method names: 'G6PZ36YpOJ', 'dTDZg86uQ5', 'NLKZ73GVAx', 'IxfZD9aRNW', 'xQrZQSM3pa', 'XCCZK18rJ7', 'HB0Z4H720f', 'AMLZCRuaZ4', 'RYLZEOoF0K', 'cVTZY8wJYh'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, MICngcRpWAq1Ca3BEG.csHigh entropy of concatenated method names: 'R1yPIpx9rO', 'cOcPwCFu9E', 'lw5P6gcquw', 'cVMPiZhOYB', 'qUCPrWu8sH', 'elwPtWVKmj', 'BfoPZoftoH', 'LowPGHaksq', 'BEcPmcJEuG', 'TO0PWFpnxP'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, YwDKbVnK9kVKNBKJYr.csHigh entropy of concatenated method names: 'jUDVCwWnAJ', 'zUjVEAyppR', 'ocGVLlHSQg', 'ihpVHnCyDP', 'zltVhaOZuA', 'fU5VJWClFJ', 'w3GVyyEkOf', 'R0OVj83vye', 'pE4VASPZdJ', 'wmxVpTacSQ'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, cjgdR6ybkcjTBDwury.csHigh entropy of concatenated method names: 'Dispose', 'rZKcxf4rwN', 'cqLnHxV10R', 'RcV99Q7sfD', 'TeacFhVqmD', 'KPcczxXWDA', 'ProcessDialogKey', 'GkMn5xjLgo', 'r9Yncs3mbd', 'mB1nn80Yxq'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, S3riKoduRPEG85kJJ8.csHigh entropy of concatenated method names: 'ftFdcCDZ2U', 'LVqdP1tTgT', 'FjKd2srunM', 'mvPdwUnLA1', 'n6Od6mvSnE', 'Lw6dr8Wl6H', 'FmSdt8GAcx', 'fXAeqC8xC1', 'Vmbev3auUS', 'wbLextdt4E'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, wcLAibsO2yvf2yWwskl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FGA8UBxN0y', 'rN98BXRvl0', 'kIA8OCoKnl', 'rPq8fnT4GC', 'T948Ta8leQ', 'h408brDGDS', 'cRn8qKSZXk'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, R9CefesxEhkTCn3mLuT.csHigh entropy of concatenated method names: 'DW9d3ArRA8', 'qMKdgRBmtp', 'hHfd71BPHf', 'p5AdDhGUS9', 'LaHdQTKTuW', 'pWhdKYm99B', 'ptWd4gowx3', 'HPMdC68P5W', 'A3odE0x0pa', 'EHEdY222NP'
                    Source: 0.2.Quote.exe.7ce0000.8.raw.unpack, cITOTbwNwgCoi63fbi.csHigh entropy of concatenated method names: 'exQ6U6UVcg', 'Mxg6Brdy29', 'jid6OEhr9o', 'fHe6fikKPF', 'gh06TVHDrE', 'ErA6bXUn2X', 's8R6qe8BQN', 'eF76vwIkNp', 'ntm6xMy1H7', 'Kix6FiR85E'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, h2NAkrHjrvlIUjTpkb.csHigh entropy of concatenated method names: 'EXRrQ4t89I', 'juIr4xyF9n', 'WVXiSsSnwI', 'aDCih5dmeF', 'J4YiJAiDRP', 'Qh6ikuXxmq', 't53iyhNdTs', 'y17ijeRefC', 'GExi0gaq2a', 'jD1iAp2qK7'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, DtAqRq3rYg4Pf2uXGQ.csHigh entropy of concatenated method names: 'AVGNWUTPGM', 'ScBNuUbe6M', 'ToString', 'd4lNwBhO9N', 'L1WN6n7MQW', 'STKNiaq3aV', 'nRONrYZeKT', 'wJCNtCoCyh', 'CQnNZpfOZY', 'mOlNGVF3lg'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, pVfCDf4VtL0vGWp54M.csHigh entropy of concatenated method names: 'ToString', 'el7XpYRPJZ', 'LvWXHDg0vm', 'VkbXS9dIcR', 'sqXXhhLYQn', 'EDtXJmneSL', 'zRUXkl0a04', 'cg6Xy0vGFh', 'FpZXjTFgUe', 'I2QX0Z5WEU'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, eXxtDP6HJGrfA787cI.csHigh entropy of concatenated method names: 'rFwZww0tHd', 'GtPZii9VI2', 'bKIZtVXgoo', 'A7utFjd7g3', 'WLytz5uHqv', 'z1ZZ5RJol7', 'p86ZcEs3U8', 'l17Zn9orns', 'rIXZPMnfrt', 'wC0Z2FExhJ'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, n0n7qqvNqQBrrEjSTd.csHigh entropy of concatenated method names: 'TvJlA897aA', 'oxHlspvDfS', 'uL2lUfLROo', 'E3VlBG19xY', 'kE9lHv8yAi', 'TAmlSTAmEp', 'JCqlhNM1NQ', 'x37lJh9U2j', 'plKlknNcWp', 'ppLlyNPpJ5'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, t6vZvYtivkxEJJOkSH.csHigh entropy of concatenated method names: 'fs2tIAj2E7', 'gP3t68TDvr', 'PaItr7vhvf', 'tYatZvoPxX', 'QrHtGalEbm', 'h0PrTnfwZH', 'l2trbPM0tI', 'EpmrqdViiH', 'yS0rvgTxSq', 'EQ7rxoYCdt'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, v4WkifSdX91u7THrFb.csHigh entropy of concatenated method names: 'LvRiD3tXKk', 'ItwiK04EEj', 'oXCiC1XD4K', 'WjIiEycxDp', 'Hvbil0Cygr', 't3riXFyCAE', 'B2piNwCUbv', 'E1hieRdsmM', 'sHkidNrGpR', 'eKji8ekFcK'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, FXeblJDoq97spMkydM.csHigh entropy of concatenated method names: 'tyfcZMHyGF', 'I1CcGUV3jV', 'hhecW6h5JZ', 'sr5cuZNCnO', 'b7aclLSusv', 'd3NcXXx3FV', 'x5CdfCAaEZKFGSxf6K', 'S4FsO2L9sX8hth2s82', 'jdeccplM4x', 'KwZcPNeadM'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, H54yoGmmZymfQkQaFU.csHigh entropy of concatenated method names: 'WyINvySHLF', 'FObNFGGcUe', 'Bmde5ZUDC4', 'x1hec01Rts', 'FtaNpFtc4U', 'K6UNsYfwxf', 'kKANMPcwav', 'TYINUvesQy', 'UBsNBoddtB', 'qrMNOcjS39'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, nFwxJdfnFVUcgQ2Q9D.csHigh entropy of concatenated method names: 'kWH7r6Soq', 'MuhDtqQPp', 'fmYKdU9Y9', 'uPG4iOGFR', 'VaBEn487x', 'LHRYDu4ag', 'd5mIGZCvcoI5bMU2NU', 'YCHrE90T2mCtjoRexI', 'AEUe3SWta', 'zgs8eXCgi'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, RuUCiRqJLJ3FBvWnr4.csHigh entropy of concatenated method names: 'f3XewI8dFV', 'HtGe6uPAq2', 'j3deiYU6ar', 'DVterkSg2R', 'Ha4etimvcq', 'neOeZfZo4Y', 'sDyeGxTjbH', 'HuRem8p6lH', 'BRYeWrBT2c', 'GcMeunDDIx'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, hFiiuCca4uAnu0BvPV.csHigh entropy of concatenated method names: 'G6PZ36YpOJ', 'dTDZg86uQ5', 'NLKZ73GVAx', 'IxfZD9aRNW', 'xQrZQSM3pa', 'XCCZK18rJ7', 'HB0Z4H720f', 'AMLZCRuaZ4', 'RYLZEOoF0K', 'cVTZY8wJYh'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, MICngcRpWAq1Ca3BEG.csHigh entropy of concatenated method names: 'R1yPIpx9rO', 'cOcPwCFu9E', 'lw5P6gcquw', 'cVMPiZhOYB', 'qUCPrWu8sH', 'elwPtWVKmj', 'BfoPZoftoH', 'LowPGHaksq', 'BEcPmcJEuG', 'TO0PWFpnxP'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, YwDKbVnK9kVKNBKJYr.csHigh entropy of concatenated method names: 'jUDVCwWnAJ', 'zUjVEAyppR', 'ocGVLlHSQg', 'ihpVHnCyDP', 'zltVhaOZuA', 'fU5VJWClFJ', 'w3GVyyEkOf', 'R0OVj83vye', 'pE4VASPZdJ', 'wmxVpTacSQ'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, cjgdR6ybkcjTBDwury.csHigh entropy of concatenated method names: 'Dispose', 'rZKcxf4rwN', 'cqLnHxV10R', 'RcV99Q7sfD', 'TeacFhVqmD', 'KPcczxXWDA', 'ProcessDialogKey', 'GkMn5xjLgo', 'r9Yncs3mbd', 'mB1nn80Yxq'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, S3riKoduRPEG85kJJ8.csHigh entropy of concatenated method names: 'ftFdcCDZ2U', 'LVqdP1tTgT', 'FjKd2srunM', 'mvPdwUnLA1', 'n6Od6mvSnE', 'Lw6dr8Wl6H', 'FmSdt8GAcx', 'fXAeqC8xC1', 'Vmbev3auUS', 'wbLextdt4E'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, wcLAibsO2yvf2yWwskl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FGA8UBxN0y', 'rN98BXRvl0', 'kIA8OCoKnl', 'rPq8fnT4GC', 'T948Ta8leQ', 'h408brDGDS', 'cRn8qKSZXk'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, R9CefesxEhkTCn3mLuT.csHigh entropy of concatenated method names: 'DW9d3ArRA8', 'qMKdgRBmtp', 'hHfd71BPHf', 'p5AdDhGUS9', 'LaHdQTKTuW', 'pWhdKYm99B', 'ptWd4gowx3', 'HPMdC68P5W', 'A3odE0x0pa', 'EHEdY222NP'
                    Source: 0.2.Quote.exe.401a218.4.raw.unpack, cITOTbwNwgCoi63fbi.csHigh entropy of concatenated method names: 'exQ6U6UVcg', 'Mxg6Brdy29', 'jid6OEhr9o', 'fHe6fikKPF', 'gh06TVHDrE', 'ErA6bXUn2X', 's8R6qe8BQN', 'eF76vwIkNp', 'ntm6xMy1H7', 'Kix6FiR85E'
                    Source: 8.2.OlhQyptevOgDP.exe.2ca7f64.2.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 8.2.OlhQyptevOgDP.exe.2ca7f64.2.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 8.2.OlhQyptevOgDP.exe.2d05898.3.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 8.2.OlhQyptevOgDP.exe.2d05898.3.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00406EEB ShellExecuteW,URLDownloadToFileW,12_2_00406EEB
                    Source: C:\Users\user\Desktop\Quote.exeFile created: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp"
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AADB

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CBE1
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5060, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040F7E2 Sleep,ExitProcess,12_2_0040F7E2
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: 13E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: 4E90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: 7EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: 8EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: 9060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: A060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMemory allocated: 4D70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMemory allocated: 7770000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMemory allocated: 8770000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMemory allocated: 8910000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMemory allocated: 9910000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,12_2_0041A7D9
                    Source: C:\Users\user\Desktop\Quote.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6078Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3584Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeWindow / User API: threadDelayed 828Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeWindow / User API: threadDelayed 8642Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeWindow / User API: foregroundWindowGot 1752Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeAPI coverage: 6.1 %
                    Source: C:\Users\user\Desktop\Quote.exe TID: 3284Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3772Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exe TID: 1580Thread sleep count: 219 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exe TID: 1580Thread sleep time: -109500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exe TID: 5532Thread sleep count: 828 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exe TID: 5532Thread sleep time: -2484000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exe TID: 5532Thread sleep count: 8642 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exe TID: 5532Thread sleep time: -25926000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe TID: 2720Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_0040928E
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,12_2_0041C322
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,12_2_0040C388
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_004096A0
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,12_2_00408847
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00407877 FindFirstFileW,FindNextFileW,12_2_00407877
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0044E8F9 FindFirstFileExA,12_2_0044E8F9
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040BB6B
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419B86
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040BD72
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407CD2
                    Source: C:\Users\user\Desktop\Quote.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: OlhQyptevOgDP.exe, 00000008.00000002.1578484951.0000000001172000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\C
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00434A8A
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CBE1
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00443355 mov eax, dword ptr fs:[00000030h]12_2_00443355
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_004120B2 GetProcessHeap,HeapFree,12_2_004120B2
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_0043503C
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00434A8A
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043BB71
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00434BD8 SetUnhandledExceptionFilter,12_2_00434BD8
                    Source: C:\Users\user\Desktop\Quote.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeMemory written: C:\Users\user\Desktop\Quote.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe12_2_00412132
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00419662 mouse_event,12_2_00419662
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeProcess created: C:\Users\user\Desktop\Quote.exe "C:\Users\user\Desktop\Quote.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeProcess created: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"Jump to behavior
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerh
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMC\:2404p
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager#
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMC\c
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager0
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMC\:2404{
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMC\
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMC\:2404I
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMC\:2404
                    Source: Quote.exe, 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmp, logs.dat.7.drBinary or memory string: [Program Manager]
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00434CB6 cpuid 12_2_00434CB6
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: EnumSystemLocalesW,12_2_0045201B
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: EnumSystemLocalesW,12_2_004520B6
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_00452143
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetLocaleInfoW,12_2_00452393
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: EnumSystemLocalesW,12_2_00448484
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_004524BC
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetLocaleInfoW,12_2_004525C3
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_00452690
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetLocaleInfoW,12_2_0044896D
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: GetLocaleInfoA,12_2_0040F90C
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,12_2_00451D58
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: EnumSystemLocalesW,12_2_00451FD0
                    Source: C:\Users\user\Desktop\Quote.exeQueries volume information: C:\Users\user\Desktop\Quote.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Quote.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeQueries volume information: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041A045 __EH_prolog,GdiplusStartup,CreateDirectoryW,Sleep,Sleep,GetLocalTime,Sleep,12_2_0041A045
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_0041B69E GetUserNameW,12_2_0041B69E
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: 12_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,12_2_00449210
                    Source: C:\Users\user\Desktop\Quote.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1577837747.0000000001087000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 5608, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\gfh\logs.dat, type: DROPPED
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data12_2_0040BA4D
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\12_2_0040BB6B
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: \key3.db12_2_0040BB6B

                    Remote Access Functionality

                    barindex
                    Source: C:\Users\user\Desktop\Quote.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J91LMCJump to behavior
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-J91LMCJump to behavior
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.OlhQyptevOgDP.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.499b870.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Quote.exe.3f5f9f8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1577837747.0000000001087000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 1232, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Quote.exe PID: 5608, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: OlhQyptevOgDP.exe PID: 5220, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\gfh\logs.dat, type: DROPPED
                    Source: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exeCode function: cmd.exe12_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    11
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    2
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    1
                    Access Token Manipulation
                    4
                    Obfuscated Files or Information
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    12
                    Software Packing
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture1
                    Remote Access Software
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                    Process Injection
                    1
                    DLL Side-Loading
                    LSA Secrets33
                    System Information Discovery
                    SSHKeylogging1
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Scheduled Task/Job
                    1
                    Bypass User Account Control
                    Cached Domain Credentials21
                    Security Software Discovery
                    VNCGUI Input Capture11
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync31
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                    Virtualization/Sandbox Evasion
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
                    Process Injection
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519453 Sample: Quote.exe Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 45 www.projectusf.com 2->45 55 Suricata IDS alerts for network traffic 2->55 57 Found malware configuration 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 11 other signatures 2->61 8 Quote.exe 7 2->8         started        12 OlhQyptevOgDP.exe 5 2->12         started        signatures3 process4 file5 35 C:\Users\user\AppData\...\OlhQyptevOgDP.exe, PE32 8->35 dropped 37 C:\...\OlhQyptevOgDP.exe:Zone.Identifier, ASCII 8->37 dropped 39 C:\Users\user\AppData\Local\...\tmpCCF1.tmp, XML 8->39 dropped 41 C:\Users\user\AppData\Local\...\Quote.exe.log, ASCII 8->41 dropped 63 Uses schtasks.exe or at.exe to add and modify task schedules 8->63 65 Adds a directory exclusion to Windows Defender 8->65 67 Injects a PE file into a foreign processes 8->67 14 Quote.exe 3 2 8->14         started        19 powershell.exe 23 8->19         started        21 schtasks.exe 1 8->21         started        69 Contains functionality to bypass UAC (CMSTPLUA) 12->69 71 Contains functionalty to change the wallpaper 12->71 73 Machine Learning detection for dropped file 12->73 75 4 other signatures 12->75 23 OlhQyptevOgDP.exe 12->23         started        25 schtasks.exe 1 12->25         started        signatures6 process7 dnsIp8 47 www.projectusf.com 103.186.117.77, 2404, 49703, 49706 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 14->47 43 C:\ProgramData\gfh\logs.dat, data 14->43 dropped 49 Detected Remcos RAT 14->49 51 Installs a global keyboard hook 14->51 53 Loading BitLocker PowerShell Module 19->53 27 WmiPrvSE.exe 19->27         started        29 conhost.exe 19->29         started        31 conhost.exe 21->31         started        33 conhost.exe 25->33         started        file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Quote.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    www.projectusf.com100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    www.projectusf.com
                    103.186.117.77
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      www.projectusf.comtrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpOlhQyptevOgDP.exefalse
                      • URL Reputation: safe
                      unknown
                      http://geoplugin.net/json.gp/CQuote.exe, 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, Quote.exe, 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, OlhQyptevOgDP.exe, 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuote.exe, 00000000.00000002.1537902992.0000000002EF3000.00000004.00000800.00020000.00000000.sdmp, OlhQyptevOgDP.exe, 00000008.00000002.1579344837.0000000002CD3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      103.186.117.77
                      www.projectusf.comunknown
                      7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1519453
                      Start date and time:2024-09-26 15:09:18 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 22s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Quote.exe
                      Detection:MAL
                      Classification:mal100.rans.troj.spyw.expl.evad.winEXE@16/12@1/1
                      EGA Information:
                      • Successful, ratio: 75%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 175
                      • Number of non-executed functions: 223
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target Quote.exe, PID 5608 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: Quote.exe
                      TimeTypeDescription
                      09:10:39API Interceptor6958148x Sleep call for process: Quote.exe modified
                      09:10:40API Interceptor16x Sleep call for process: powershell.exe modified
                      09:10:43API Interceptor1x Sleep call for process: OlhQyptevOgDP.exe modified
                      15:10:41Task SchedulerRun new task: OlhQyptevOgDP path: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      103.186.117.77QUOTATION.exeGet hashmaliciousRemcosBrowse
                        Contracts1.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                          Contract1348.batGet hashmaliciousRemcos, DBatLoaderBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            www.projectusf.comQUOTATION.exeGet hashmaliciousRemcosBrowse
                            • 103.186.117.77
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AARNET-AS-APAustralianAcademicandResearchNetworkAARNehttps://counsellingbyanika.com/m/?c3Y9bzM2NV8xX25vbSZyYW5kPVprRkZWV3c9JnVpZD1VU0VSMjMwOTIwMjRVNTAwOTIzMjU===Get hashmaliciousUnknownBrowse
                            • 103.171.180.10
                            https://iyary.lat/Get hashmaliciousUnknownBrowse
                            • 103.165.81.46
                            SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exeGet hashmaliciousRemcosBrowse
                            • 103.186.116.145
                            rsJtZBgpwG.elfGet hashmaliciousMiraiBrowse
                            • 103.128.198.80
                            https://dweb.link/ipfs/QmesssDqFnCTLy37t8Srcq12Tjchz4atRzkxjV2QTjw1sp/Get hashmaliciousUnknownBrowse
                            • 103.180.114.1
                            http://alicona.tbfs-industerial.com/auth/activeyg/3mail@b.cGet hashmaliciousUnknownBrowse
                            • 103.191.241.218
                            http://uscwm.tbfs-industerial.com/activate/activeaG/3mail@b.cGet hashmaliciousUnknownBrowse
                            • 103.191.241.218
                            SecuriteInfo.com.Trojan.Packed2.48025.19608.243.exeGet hashmaliciousRemcosBrowse
                            • 103.186.116.145
                            QUOTATION.exeGet hashmaliciousRemcosBrowse
                            • 103.186.117.77
                            SecuriteInfo.com.Linux.Siggen.9999.13221.8731.elfGet hashmaliciousUnknownBrowse
                            • 103.160.46.122
                            No context
                            No context
                            Process:C:\Users\user\Desktop\Quote.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):144
                            Entropy (8bit):3.3544524354439966
                            Encrypted:false
                            SSDEEP:3:rhlKlRlrPlHDeDl5JWRal2Jl+7R0DAlBG45klovDl6v:6ltC55YcIeeDAlOWAv
                            MD5:2F97BCD3363D9EEA26590DF33A465F9E
                            SHA1:F8B8F79402D7952B8A876D1A1E1A118245B45206
                            SHA-256:C80FA0A57E738EB247D3845518333D7AF2C998E8C6D97B018ACBF3E2B1B79F17
                            SHA-512:0F4282B737643297904489897C2052FDFA76E582958F6A899C3C2E450D018FE88DBAFD30C5D3C1985A7770FB96BEE420FD91092C9774FC7EFE537A712A6DD130
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\gfh\logs.dat, Author: Joe Security
                            Reputation:low
                            Preview:....[.2.0.2.4./.0.9./.2.6. .0.9.:.1.0.:.4.0. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                            Process:C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Users\user\Desktop\Quote.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2232
                            Entropy (8bit):5.380747059108785
                            Encrypted:false
                            SSDEEP:48:lylWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//ZeUyus:lGLHxvIIwLgZ2KRHWLOugos
                            MD5:F7886DFFC660638655D2610AE0B1D243
                            SHA1:67334853E5C508F7061ABD4209DE119DF931569C
                            SHA-256:39716FD4F461FA50AC9ECCFDCCC504C7A6D7D7E5390671FD840DF68D34A480AA
                            SHA-512:6510F9251D1EFE5117E19BF700BA3457396E628510E77EB8B02EE924CE1F3A2A47E91C7C713651BCD99A921EBA0DA0E47219184B83928DF5C6A0EEC1FDBB00C1
                            Malicious:false
                            Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Users\user\Desktop\Quote.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1579
                            Entropy (8bit):5.079495307128511
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhLX1a4y1mEBUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtiGFxvn:cgeTgYrFdOFzOzN33ODOiDdKrsuTpv
                            MD5:EB15F66C7290894A1611384F56556BDD
                            SHA1:B2B78C7D1C9AD598CBCB2E38969671403E6F4740
                            SHA-256:78AD42AC86462C8941FB87D3C5E727CFBFD84FB5B059C1547252825AFB9B01A9
                            SHA-512:0D73CB06953E0751D9B3D0D5668B04520B9039C6A7C93871E4453DD3987955E27CAE9F6977499549A437ACD8350BC05BE60D90C90F155671EB363B42CF2AA03C
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                            Process:C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1579
                            Entropy (8bit):5.079495307128511
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhLX1a4y1mEBUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtiGFxvn:cgeTgYrFdOFzOzN33ODOiDdKrsuTpv
                            MD5:EB15F66C7290894A1611384F56556BDD
                            SHA1:B2B78C7D1C9AD598CBCB2E38969671403E6F4740
                            SHA-256:78AD42AC86462C8941FB87D3C5E727CFBFD84FB5B059C1547252825AFB9B01A9
                            SHA-512:0D73CB06953E0751D9B3D0D5668B04520B9039C6A7C93871E4453DD3987955E27CAE9F6977499549A437ACD8350BC05BE60D90C90F155671EB363B42CF2AA03C
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                            Process:C:\Users\user\Desktop\Quote.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):937472
                            Entropy (8bit):7.883253430304055
                            Encrypted:false
                            SSDEEP:12288:OdK2wPfKaoFsNyjcFg/Q5P4Uf1fTX5muSPflsEXywds31GHvMb7d+fLnnjnU+DL:FPfKaKsNEesQ5PxL5mjHiwOFEvMOPn3
                            MD5:0B18DE9B2B7F17FC93796EABEE8D26DD
                            SHA1:0C0F08A2DF8262960E6290900BFF0684847CC0C8
                            SHA-256:929167F47E1116759145EB457F86474A311374373B05B11438EA1222A9E2A8F0
                            SHA-512:07A146051648B7BF1A7024BF1375B27B3EE6EA07C9C455EDE24D3EDCE26D79E2F227A9B1A9BA0EB4F5E05C75E458169E48C3A8A1ACAF731781A0F105ACE37860
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?.f..............0..B...........a... ........@.. ....................................@..................................a..O.......t............................<..T............................................ ............... ..H............text....A... ...B.................. ..`.rsrc...t............D..............@..@.reloc...............L..............@..B.................a......H.......`t..`P......(........w..........................................&.(......*...0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*".......*.0..!........(....rC..p~....o......t.....+..*....0..!........(....rI..p~....o......t.....+..*....0...........~.....+..*".(.....*Vs....(....t.........*...0..`........s....}.....s....}.....rS..p}.....rS..p}.....s....}.....s....}......}......}.....( ......($....*.0..i..........o!.....(......(..
                            Process:C:\Users\user\Desktop\Quote.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.883253430304055
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:Quote.exe
                            File size:937'472 bytes
                            MD5:0b18de9b2b7f17fc93796eabee8d26dd
                            SHA1:0c0f08a2df8262960e6290900bff0684847cc0c8
                            SHA256:929167f47e1116759145eb457f86474a311374373b05b11438ea1222a9e2a8f0
                            SHA512:07a146051648b7bf1a7024bf1375b27b3ee6ea07c9c455ede24d3edce26d79e2f227a9b1a9ba0eb4f5e05c75e458169e48c3a8a1acaf731781a0f105ace37860
                            SSDEEP:12288:OdK2wPfKaoFsNyjcFg/Q5P4Uf1fTX5muSPflsEXywds31GHvMb7d+fLnnjnU+DL:FPfKaKsNEesQ5PxL5mjHiwOFEvMOPn3
                            TLSH:771512056199EF12C0B21BF90872C2F427B59E4C5812E3479DEE7EEFB87A3942645393
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?.f..............0..B...........a... ........@.. ....................................@................................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x4e61f2
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66F13FB1 [Mon Sep 23 10:15:13 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xe619f0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x674.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xe3c900x54.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xe41f80xe4200d1c7d18eb6ee260311ed01ea2f21fb14False0.9400524400684932data7.889628616904563IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xe80000x6740x80032a2b07f393c1894722e1a3c99ff7301False0.3427734375data3.538739715672529IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xea0000xc0x20009399096c6b3ee017c382f1d9c2c7d38False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0xe80900x3e4data0.3965863453815261
                            RT_MANIFEST0xe84840x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-09-26T15:10:41.513123+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1149703103.186.117.772404TCP
                            2024-09-26T15:10:44.607768+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1149706103.186.117.772404TCP
                            2024-09-26T15:10:47.685249+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1149708103.186.117.772404TCP
                            2024-09-26T15:10:50.764599+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1149709103.186.117.772404TCP
                            2024-09-26T15:10:53.851235+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1149710103.186.117.772404TCP
                            2024-09-26T15:10:56.918605+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1149712103.186.117.772404TCP
                            2024-09-26T15:10:59.996716+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1149716103.186.117.772404TCP
                            2024-09-26T15:11:03.090663+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1163278103.186.117.772404TCP
                            2024-09-26T15:11:06.152406+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161714103.186.117.772404TCP
                            2024-09-26T15:11:09.246828+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161716103.186.117.772404TCP
                            2024-09-26T15:11:12.324184+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161717103.186.117.772404TCP
                            2024-09-26T15:11:15.418309+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161718103.186.117.772404TCP
                            2024-09-26T15:11:18.480623+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161719103.186.117.772404TCP
                            2024-09-26T15:11:21.559243+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161720103.186.117.772404TCP
                            2024-09-26T15:11:24.621137+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161721103.186.117.772404TCP
                            2024-09-26T15:11:27.716539+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161722103.186.117.772404TCP
                            2024-09-26T15:11:30.796708+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161723103.186.117.772404TCP
                            2024-09-26T15:11:33.871806+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161724103.186.117.772404TCP
                            2024-09-26T15:11:36.934060+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161725103.186.117.772404TCP
                            2024-09-26T15:11:40.029058+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161726103.186.117.772404TCP
                            2024-09-26T15:11:43.282974+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161727103.186.117.772404TCP
                            2024-09-26T15:11:46.371166+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161728103.186.117.772404TCP
                            2024-09-26T15:11:49.465456+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161729103.186.117.772404TCP
                            2024-09-26T15:11:52.542714+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161730103.186.117.772404TCP
                            2024-09-26T15:11:55.623424+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161731103.186.117.772404TCP
                            2024-09-26T15:11:58.700002+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161732103.186.117.772404TCP
                            2024-09-26T15:12:01.784613+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161733103.186.117.772404TCP
                            2024-09-26T15:12:04.905433+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161734103.186.117.772404TCP
                            2024-09-26T15:12:07.997419+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161735103.186.117.772404TCP
                            2024-09-26T15:12:11.074219+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161736103.186.117.772404TCP
                            2024-09-26T15:12:14.319376+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161737103.186.117.772404TCP
                            2024-09-26T15:12:17.496002+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161738103.186.117.772404TCP
                            2024-09-26T15:12:20.590429+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161739103.186.117.772404TCP
                            2024-09-26T15:12:23.652562+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161740103.186.117.772404TCP
                            2024-09-26T15:12:26.701177+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161741103.186.117.772404TCP
                            2024-09-26T15:12:29.683564+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161742103.186.117.772404TCP
                            2024-09-26T15:12:32.699538+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161743103.186.117.772404TCP
                            2024-09-26T15:12:35.922652+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161744103.186.117.772404TCP
                            2024-09-26T15:12:38.871083+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161745103.186.117.772404TCP
                            2024-09-26T15:12:41.917890+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161746103.186.117.772404TCP
                            2024-09-26T15:12:44.763088+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161747103.186.117.772404TCP
                            2024-09-26T15:12:47.590174+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161748103.186.117.772404TCP
                            2024-09-26T15:12:50.402177+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161749103.186.117.772404TCP
                            2024-09-26T15:12:53.245954+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161750103.186.117.772404TCP
                            2024-09-26T15:12:56.136777+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161751103.186.117.772404TCP
                            2024-09-26T15:12:58.855553+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161752103.186.117.772404TCP
                            2024-09-26T15:13:01.560564+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161753103.186.117.772404TCP
                            2024-09-26T15:13:04.324100+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161754103.186.117.772404TCP
                            2024-09-26T15:13:06.965626+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161755103.186.117.772404TCP
                            2024-09-26T15:13:09.623845+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161756103.186.117.772404TCP
                            2024-09-26T15:13:12.340039+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161757103.186.117.772404TCP
                            2024-09-26T15:13:15.029131+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161758103.186.117.772404TCP
                            2024-09-26T15:13:17.824111+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161759103.186.117.772404TCP
                            2024-09-26T15:13:20.661150+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161760103.186.117.772404TCP
                            2024-09-26T15:13:23.214863+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161761103.186.117.772404TCP
                            2024-09-26T15:13:25.811539+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161762103.186.117.772404TCP
                            2024-09-26T15:13:28.343466+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161763103.186.117.772404TCP
                            2024-09-26T15:13:30.871590+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161764103.186.117.772404TCP
                            2024-09-26T15:13:33.497554+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161765103.186.117.772404TCP
                            2024-09-26T15:13:35.985543+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161766103.186.117.772404TCP
                            2024-09-26T15:13:38.449607+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161767103.186.117.772404TCP
                            2024-09-26T15:13:40.886683+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161768103.186.117.772404TCP
                            2024-09-26T15:13:43.383296+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161769103.186.117.772404TCP
                            2024-09-26T15:13:45.793483+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161770103.186.117.772404TCP
                            2024-09-26T15:13:48.199479+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161771103.186.117.772404TCP
                            2024-09-26T15:13:50.590644+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161772103.186.117.772404TCP
                            2024-09-26T15:13:52.997513+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161773103.186.117.772404TCP
                            2024-09-26T15:13:55.371810+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161774103.186.117.772404TCP
                            2024-09-26T15:13:57.746682+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161775103.186.117.772404TCP
                            2024-09-26T15:14:00.091617+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161776103.186.117.772404TCP
                            2024-09-26T15:14:02.479999+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161777103.186.117.772404TCP
                            2024-09-26T15:14:04.808996+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161778103.186.117.772404TCP
                            2024-09-26T15:14:07.153196+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161779103.186.117.772404TCP
                            2024-09-26T15:14:09.480523+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161780103.186.117.772404TCP
                            2024-09-26T15:14:11.794658+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161781103.186.117.772404TCP
                            2024-09-26T15:14:14.105754+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161782103.186.117.772404TCP
                            2024-09-26T15:14:16.419342+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161783103.186.117.772404TCP
                            2024-09-26T15:14:18.762002+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161784103.186.117.772404TCP
                            2024-09-26T15:14:21.047770+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161785103.186.117.772404TCP
                            2024-09-26T15:14:23.342991+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161786103.186.117.772404TCP
                            2024-09-26T15:14:25.605662+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161787103.186.117.772404TCP
                            2024-09-26T15:14:27.855528+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161788103.186.117.772404TCP
                            2024-09-26T15:14:30.371666+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161789103.186.117.772404TCP
                            2024-09-26T15:14:32.637050+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161790103.186.117.772404TCP
                            2024-09-26T15:14:34.889651+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161791103.186.117.772404TCP
                            2024-09-26T15:14:37.138746+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161792103.186.117.772404TCP
                            2024-09-26T15:14:39.371649+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161793103.186.117.772404TCP
                            2024-09-26T15:14:41.639740+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161794103.186.117.772404TCP
                            2024-09-26T15:14:43.871582+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1161795103.186.117.772404TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 26, 2024 15:10:41.506254911 CEST497032404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:41.511244059 CEST240449703103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:41.511411905 CEST497032404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:41.513123035 CEST497032404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:41.518763065 CEST240449703103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:43.577045918 CEST240449703103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:43.577182055 CEST497032404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:43.587512970 CEST497032404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:43.592390060 CEST240449703103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:44.601818085 CEST497062404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:44.606972933 CEST240449706103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:44.607094049 CEST497062404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:44.607768059 CEST497062404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:44.612648964 CEST240449706103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:46.665906906 CEST240449706103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:46.665977001 CEST497062404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:46.666027069 CEST497062404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:46.670845032 CEST240449706103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:47.679271936 CEST497082404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:47.684787035 CEST240449708103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:47.684871912 CEST497082404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:47.685249090 CEST497082404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:47.690048933 CEST240449708103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:49.748693943 CEST240449708103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:49.748800039 CEST497082404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:49.748872995 CEST497082404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:49.753670931 CEST240449708103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:50.756840944 CEST497092404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:50.761758089 CEST240449709103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:50.761825085 CEST497092404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:50.764599085 CEST497092404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:50.769444942 CEST240449709103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:52.827229977 CEST240449709103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:52.827353001 CEST497092404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:52.827570915 CEST497092404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:52.832499981 CEST240449709103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:53.841927052 CEST497102404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:53.847873926 CEST240449710103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:53.847956896 CEST497102404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:53.851234913 CEST497102404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:53.856564999 CEST240449710103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:55.903203011 CEST240449710103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:55.903296947 CEST497102404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:55.903336048 CEST497102404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:55.908164978 CEST240449710103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:56.913228989 CEST497122404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:56.918054104 CEST240449712103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:56.918185949 CEST497122404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:56.918605089 CEST497122404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:56.923508883 CEST240449712103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:58.982105017 CEST240449712103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:58.982230902 CEST497122404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:58.982355118 CEST497122404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:58.987196922 CEST240449712103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:59.991224051 CEST497162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:59.996157885 CEST240449716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:10:59.996252060 CEST497162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:10:59.996716022 CEST497162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:00.002613068 CEST240449716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:02.077263117 CEST240449716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:02.077330112 CEST497162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:02.077383041 CEST497162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:02.082864046 CEST240449716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:03.085170031 CEST632782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:03.090091944 CEST240463278103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:03.090217113 CEST632782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:03.090662956 CEST632782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:03.095499992 CEST240463278103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:05.136003017 CEST240463278103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:05.136101007 CEST632782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:05.136131048 CEST632782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:05.141016006 CEST240463278103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:06.147044897 CEST617142404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:06.151887894 CEST240461714103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:06.152024984 CEST617142404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:06.152405977 CEST617142404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:06.157296896 CEST240461714103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:08.235904932 CEST240461714103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:08.236016035 CEST617142404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:08.236080885 CEST617142404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:08.240895033 CEST240461714103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:09.241071939 CEST617162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:09.246306896 CEST240461716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:09.246433020 CEST617162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:09.246828079 CEST617162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:09.251667023 CEST240461716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:11.307835102 CEST240461716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:11.307959080 CEST617162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:11.308141947 CEST617162404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:11.312987089 CEST240461716103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:12.318677902 CEST617172404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:12.323654890 CEST240461717103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:12.323745966 CEST617172404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:12.324183941 CEST617172404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:12.329395056 CEST240461717103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:14.403996944 CEST240461717103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:14.404133081 CEST617172404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:14.404197931 CEST617172404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:14.409065008 CEST240461717103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:15.412795067 CEST617182404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:15.417771101 CEST240461718103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:15.417903900 CEST617182404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:15.418308973 CEST617182404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:15.423186064 CEST240461718103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:17.464143038 CEST240461718103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:17.464282990 CEST617182404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:17.464355946 CEST617182404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:17.469434977 CEST240461718103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:18.474987984 CEST617192404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:18.479973078 CEST240461719103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:18.480072975 CEST617192404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:18.480623007 CEST617192404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:18.485462904 CEST240461719103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:20.546811104 CEST240461719103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:20.546952963 CEST617192404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:20.547069073 CEST617192404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:20.551965952 CEST240461719103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:21.553572893 CEST617202404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:21.558603048 CEST240461720103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:21.558753014 CEST617202404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:21.559242964 CEST617202404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:21.564121962 CEST240461720103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:23.605074883 CEST240461720103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:23.605281115 CEST617202404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:23.605498075 CEST617202404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:23.610323906 CEST240461720103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:24.615530014 CEST617212404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:24.620578051 CEST240461721103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:24.620691061 CEST617212404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:24.621136904 CEST617212404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:24.625942945 CEST240461721103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:26.695132971 CEST240461721103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:26.695225000 CEST617212404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:26.695292950 CEST617212404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:26.700198889 CEST240461721103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:27.709455013 CEST617222404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:27.715776920 CEST240461722103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:27.715929031 CEST617222404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:27.716538906 CEST617222404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:27.722652912 CEST240461722103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:29.781084061 CEST240461722103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:29.781249046 CEST617222404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:29.781373978 CEST617222404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:29.786169052 CEST240461722103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:30.789006948 CEST617232404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:30.793962955 CEST240461723103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:30.794054985 CEST617232404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:30.796708107 CEST617232404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:30.801618099 CEST240461723103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:32.855946064 CEST240461723103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:32.856225967 CEST617232404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:32.856225967 CEST617232404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:32.861227036 CEST240461723103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:33.865626097 CEST617242404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:33.870769978 CEST240461724103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:33.870896101 CEST617242404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:33.871805906 CEST617242404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:33.876724005 CEST240461724103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:35.917879105 CEST240461724103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:35.918016911 CEST617242404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:35.918106079 CEST617242404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:35.922878027 CEST240461724103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:36.928553104 CEST617252404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:36.933522940 CEST240461725103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:36.933613062 CEST617252404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:36.934060097 CEST617252404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:36.939002991 CEST240461725103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:39.019402981 CEST240461725103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:39.019542933 CEST617252404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:39.019695997 CEST617252404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:39.024530888 CEST240461725103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:40.022357941 CEST617262404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:40.028307915 CEST240461726103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:40.028568029 CEST617262404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:40.029057980 CEST617262404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:40.033894062 CEST240461726103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:42.093641996 CEST240461726103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:42.093727112 CEST617262404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:42.093775988 CEST617262404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:42.098648071 CEST240461726103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:43.100300074 CEST617272404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:43.282258034 CEST240461727103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:43.282434940 CEST617272404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:43.282974005 CEST617272404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:43.287734032 CEST240461727103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:45.355437994 CEST240461727103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:45.355547905 CEST617272404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:45.355601072 CEST617272404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:45.360774040 CEST240461727103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:46.365816116 CEST617282404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:46.370671034 CEST240461728103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:46.370793104 CEST617282404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:46.371165991 CEST617282404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:46.375989914 CEST240461728103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:48.456197023 CEST240461728103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:48.456295967 CEST617282404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:48.456331968 CEST617282404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:48.461173058 CEST240461728103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:49.459502935 CEST617292404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:49.464303970 CEST240461729103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:49.465260983 CEST617292404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:49.465456009 CEST617292404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:49.470289946 CEST240461729103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:51.529489994 CEST240461729103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:51.529561996 CEST617292404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:51.529608965 CEST617292404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:51.534392118 CEST240461729103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:52.537441015 CEST617302404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:52.542327881 CEST240461730103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:52.542398930 CEST617302404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:52.542714119 CEST617302404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:52.547467947 CEST240461730103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:54.609532118 CEST240461730103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:54.613115072 CEST617302404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:54.613115072 CEST617302404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:54.618103981 CEST240461730103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:55.615622997 CEST617312404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:55.620609045 CEST240461731103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:55.623121023 CEST617312404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:55.623424053 CEST617312404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:55.628190041 CEST240461731103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:57.684082031 CEST240461731103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:57.687376022 CEST617312404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:57.687449932 CEST617312404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:57.692338943 CEST240461731103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:58.693906069 CEST617322404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:58.698908091 CEST240461732103.186.117.77192.168.2.11
                            Sep 26, 2024 15:11:58.699719906 CEST617322404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:58.700001955 CEST617322404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:11:58.705447912 CEST240461732103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:00.761802912 CEST240461732103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:00.761871099 CEST617322404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:00.761909008 CEST617322404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:00.766958952 CEST240461732103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:01.772209883 CEST617332404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:01.777096033 CEST240461733103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:01.781130075 CEST617332404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:01.784612894 CEST617332404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:01.789410114 CEST240461733103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:03.861208916 CEST240461733103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:03.861272097 CEST617332404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:03.863457918 CEST617332404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:03.868280888 CEST240461733103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:04.898987055 CEST617342404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:04.903970003 CEST240461734103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:04.905129910 CEST617342404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:04.905432940 CEST617342404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:04.910428047 CEST240461734103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:06.989015102 CEST240461734103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:06.989087105 CEST617342404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:06.989159107 CEST617342404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:06.993904114 CEST240461734103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:07.990809917 CEST617352404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:07.995769978 CEST240461735103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:07.997189045 CEST617352404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:07.997419119 CEST617352404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:08.002661943 CEST240461735103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:10.061289072 CEST240461735103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:10.065157890 CEST617352404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:10.065186024 CEST617352404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:10.070076942 CEST240461735103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:11.068932056 CEST617362404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:11.073887110 CEST240461736103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:11.074019909 CEST617362404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:11.074218988 CEST617362404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:11.079256058 CEST240461736103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:13.299352884 CEST240461736103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:13.299436092 CEST617362404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:13.299463034 CEST617362404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:13.304420948 CEST240461736103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:14.308190107 CEST617372404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:14.313117027 CEST240461737103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:14.313265085 CEST617372404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:14.319375992 CEST617372404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:14.324168921 CEST240461737103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:16.485292912 CEST240461737103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:16.485356092 CEST617372404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:16.485385895 CEST617372404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:16.494453907 CEST240461737103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:17.490643024 CEST617382404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:17.495651960 CEST240461738103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:17.495743036 CEST617382404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:17.496001959 CEST617382404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:17.500840902 CEST240461738103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:19.578104019 CEST240461738103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:19.579489946 CEST617382404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:19.579489946 CEST617382404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:19.584323883 CEST240461738103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:20.585068941 CEST617392404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:20.589975119 CEST240461739103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:20.590111971 CEST617392404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:20.590429068 CEST617392404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:20.595201969 CEST240461739103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:22.668421984 CEST240461739103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:22.668507099 CEST617392404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:22.668539047 CEST617392404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:22.673393011 CEST240461739103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:23.647079945 CEST617402404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:23.652139902 CEST240461740103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:23.652215958 CEST617402404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:23.652561903 CEST617402404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:23.657351971 CEST240461740103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:25.746896982 CEST240461740103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:25.746994972 CEST617402404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:25.746994972 CEST617402404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:25.751816034 CEST240461740103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:26.694401026 CEST617412404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:26.700716019 CEST240461741103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:26.700805902 CEST617412404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:26.701176882 CEST617412404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:26.706432104 CEST240461741103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:28.763923883 CEST240461741103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:28.764069080 CEST617412404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:28.764069080 CEST617412404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:28.769172907 CEST240461741103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:29.678178072 CEST617422404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:29.683157921 CEST240461742103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:29.683259964 CEST617422404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:29.683563948 CEST617422404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:29.688313961 CEST240461742103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:31.817162037 CEST240461742103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:31.817307949 CEST617422404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:31.817341089 CEST617422404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:31.822189093 CEST240461742103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:32.694103956 CEST617432404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:32.699079037 CEST240461743103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:32.699239016 CEST617432404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:32.699537992 CEST617432404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:32.704343081 CEST240461743103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:34.855629921 CEST240461743103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:34.855752945 CEST617432404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:34.855792046 CEST617432404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:34.860651016 CEST240461743103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:35.709655046 CEST617442404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:35.922043085 CEST240461744103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:35.922183037 CEST617442404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:35.922652006 CEST617442404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:35.927488089 CEST240461744103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:38.043829918 CEST240461744103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:38.045291901 CEST617442404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:38.045293093 CEST617442404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:38.050458908 CEST240461744103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:38.865837097 CEST617452404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:38.870695114 CEST240461745103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:38.870779991 CEST617452404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:38.871083021 CEST617452404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:38.875933886 CEST240461745103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:40.918108940 CEST240461745103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:40.918203115 CEST617452404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:40.918203115 CEST617452404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:40.923094034 CEST240461745103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:41.709620953 CEST617462404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:41.917402029 CEST240461746103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:41.917558908 CEST617462404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:41.917890072 CEST617462404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:41.922703981 CEST240461746103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:43.983180046 CEST240461746103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:43.983409882 CEST617462404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:43.983409882 CEST617462404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:43.988302946 CEST240461746103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:44.757793903 CEST617472404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:44.762727976 CEST240461747103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:44.762811899 CEST617472404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:44.763087988 CEST617472404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:44.768326998 CEST240461747103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:46.841022968 CEST240461747103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:46.841098070 CEST617472404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:46.841157913 CEST617472404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:46.846031904 CEST240461747103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:47.584872007 CEST617482404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:47.589762926 CEST240461748103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:47.589835882 CEST617482404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:47.590173960 CEST617482404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:47.594944000 CEST240461748103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:49.675079107 CEST240461748103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:49.675199032 CEST617482404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:49.675246000 CEST617482404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:49.680035114 CEST240461748103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:50.396907091 CEST617492404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:50.401829004 CEST240461749103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:50.401918888 CEST617492404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:50.402177095 CEST617492404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:50.406990051 CEST240461749103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:52.544130087 CEST240461749103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:52.544487953 CEST617492404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:52.544528008 CEST617492404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:52.549420118 CEST240461749103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:53.240685940 CEST617502404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:53.245605946 CEST240461750103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:53.245691061 CEST617502404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:53.245954037 CEST617502404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:53.250718117 CEST240461750103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:55.458574057 CEST240461750103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:55.458638906 CEST617502404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:55.458671093 CEST617502404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:55.463531971 CEST240461750103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:56.131563902 CEST617512404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:56.136451006 CEST240461751103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:56.136526108 CEST617512404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:56.136776924 CEST617512404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:56.141704082 CEST240461751103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:58.204196930 CEST240461751103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:58.204303026 CEST617512404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:58.204361916 CEST617512404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:58.209311008 CEST240461751103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:58.850136042 CEST617522404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:58.855109930 CEST240461752103.186.117.77192.168.2.11
                            Sep 26, 2024 15:12:58.855262041 CEST617522404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:58.855552912 CEST617522404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:12:58.860446930 CEST240461752103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:00.923361063 CEST240461752103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:00.927442074 CEST617522404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:00.927443027 CEST617522404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:00.933355093 CEST240461752103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:01.555244923 CEST617532404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:01.560112000 CEST240461753103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:01.560259104 CEST617532404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:01.560564041 CEST617532404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:01.566251040 CEST240461753103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:03.706361055 CEST240461753103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:03.706470013 CEST617532404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:03.706556082 CEST617532404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:03.711419106 CEST240461753103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:04.318849087 CEST617542404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:04.323698044 CEST240461754103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:04.323787928 CEST617542404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:04.324100018 CEST617542404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:04.328927994 CEST240461754103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:06.371918917 CEST240461754103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:06.373284101 CEST617542404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:06.373284101 CEST617542404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:06.378168106 CEST240461754103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:06.959569931 CEST617552404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:06.964531898 CEST240461755103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:06.965244055 CEST617552404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:06.965626001 CEST617552404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:06.970405102 CEST240461755103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:09.013377905 CEST240461755103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:09.014292955 CEST617552404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:09.035546064 CEST617552404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:09.040462971 CEST240461755103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:09.616075993 CEST617562404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:09.621061087 CEST240461756103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:09.621184111 CEST617562404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:09.623845100 CEST617562404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:09.628773928 CEST240461756103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:11.779863119 CEST240461756103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:11.783039093 CEST617562404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:11.783039093 CEST617562404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:11.787854910 CEST240461756103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:12.334706068 CEST617572404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:12.339673042 CEST240461757103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:12.339742899 CEST617572404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:12.340039015 CEST617572404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:12.344815969 CEST240461757103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:14.484021902 CEST240461757103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:14.484184980 CEST617572404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:14.484222889 CEST617572404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:14.489116907 CEST240461757103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:15.022267103 CEST617582404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:15.027558088 CEST240461758103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:15.027694941 CEST617582404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:15.029130936 CEST617582404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:15.033915997 CEST240461758103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:17.300934076 CEST240461758103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:17.301006079 CEST617582404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:17.301196098 CEST617582404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:17.305984974 CEST240461758103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:17.818830967 CEST617592404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:17.823762894 CEST240461759103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:17.823862076 CEST617592404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:17.824110985 CEST617592404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:17.829051971 CEST240461759103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:20.148152113 CEST240461759103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:20.151912928 CEST617592404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:20.151913881 CEST617592404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:20.156711102 CEST240461759103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:20.653151035 CEST617602404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:20.658113956 CEST240461760103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:20.661149025 CEST617602404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:20.661149979 CEST617602404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:20.666125059 CEST240461760103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:22.719042063 CEST240461760103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:22.719109058 CEST617602404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:22.719156027 CEST617602404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:22.723937988 CEST240461760103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:23.209508896 CEST617612404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:23.214481115 CEST240461761103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:23.214579105 CEST617612404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:23.214863062 CEST617612404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:23.219686031 CEST240461761103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:25.330082893 CEST240461761103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:25.330209017 CEST617612404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:25.330246925 CEST617612404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:25.335123062 CEST240461761103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:25.805197001 CEST617622404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:25.810029030 CEST240461762103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:25.811538935 CEST617622404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:25.811538935 CEST617622404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:25.816350937 CEST240461762103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:27.876627922 CEST240461762103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:27.878266096 CEST617622404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:27.878315926 CEST617622404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:27.883234024 CEST240461762103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:28.335221052 CEST617632404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:28.340100050 CEST240461763103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:28.343466043 CEST617632404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:28.343466043 CEST617632404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:28.349705935 CEST240461763103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:30.428909063 CEST240461763103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:30.431528091 CEST617632404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:30.431529045 CEST617632404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:30.436527014 CEST240461763103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:30.866300106 CEST617642404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:30.871126890 CEST240461764103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:30.871192932 CEST617642404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:30.871589899 CEST617642404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:30.876579046 CEST240461764103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:33.064384937 CEST240461764103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:33.064469099 CEST617642404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:33.064547062 CEST617642404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:33.069382906 CEST240461764103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:33.491045952 CEST617652404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:33.495992899 CEST240461765103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:33.497275114 CEST617652404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:33.497554064 CEST617652404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:33.502427101 CEST240461765103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:35.562577963 CEST240461765103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:35.562644958 CEST617652404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:35.562689066 CEST617652404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:35.567523003 CEST240461765103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:35.975375891 CEST617662404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:35.980457067 CEST240461766103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:35.985306978 CEST617662404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:35.985543013 CEST617662404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:35.990408897 CEST240461766103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:38.044826031 CEST240461766103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:38.045242071 CEST617662404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:38.045409918 CEST617662404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:38.050276041 CEST240461766103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:38.443928003 CEST617672404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:38.448919058 CEST240461767103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:38.449373960 CEST617672404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:38.449606895 CEST617672404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:38.455351114 CEST240461767103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:40.498332977 CEST240461767103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:40.498394966 CEST617672404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:40.498661995 CEST617672404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:40.503536940 CEST240461767103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:40.881387949 CEST617682404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:40.886312962 CEST240461768103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:40.886414051 CEST617682404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:40.886682987 CEST617682404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:40.891475916 CEST240461768103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:42.969544888 CEST240461768103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:42.972398043 CEST617682404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:42.972435951 CEST617682404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:42.977236986 CEST240461768103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:43.356829882 CEST617692404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:43.373743057 CEST240461769103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:43.375509977 CEST617692404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:43.383296013 CEST617692404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:43.388196945 CEST240461769103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:45.436677933 CEST240461769103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:45.436773062 CEST617692404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:45.436774015 CEST617692404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:45.441683054 CEST240461769103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:45.787771940 CEST617702404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:45.792606115 CEST240461770103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:45.793231010 CEST617702404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:45.793483019 CEST617702404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:45.798295021 CEST240461770103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:47.841934919 CEST240461770103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:47.842000961 CEST617702404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:47.842050076 CEST617702404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:47.846893072 CEST240461770103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:48.194066048 CEST617712404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:48.199131012 CEST240461771103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:48.199234009 CEST617712404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:48.199479103 CEST617712404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:48.204276085 CEST240461771103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:50.250572920 CEST240461771103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:50.250673056 CEST617712404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:50.250771046 CEST617712404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:50.255598068 CEST240461771103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:50.585052967 CEST617722404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:50.590275049 CEST240461772103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:50.590365887 CEST617722404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:50.590643883 CEST617722404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:50.595592022 CEST240461772103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:52.658587933 CEST240461772103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:52.661278963 CEST617722404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:52.661334038 CEST617722404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:52.666241884 CEST240461772103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:52.991446018 CEST617732404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:52.997169971 CEST240461773103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:52.997277975 CEST617732404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:52.997513056 CEST617732404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:53.003920078 CEST240461773103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:55.045761108 CEST240461773103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:55.049278975 CEST617732404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:55.049278975 CEST617732404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:55.054359913 CEST240461773103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:55.366254091 CEST617742404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:55.371440887 CEST240461774103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:55.371536970 CEST617742404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:55.371809959 CEST617742404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:55.376718044 CEST240461774103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:57.440093040 CEST240461774103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:57.440177917 CEST617742404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:57.440221071 CEST617742404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:57.445123911 CEST240461774103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:57.740922928 CEST617752404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:57.745965958 CEST240461775103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:57.746037960 CEST617752404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:57.746681929 CEST617752404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:57.751497030 CEST240461775103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:59.797858953 CEST240461775103.186.117.77192.168.2.11
                            Sep 26, 2024 15:13:59.797980070 CEST617752404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:59.798062086 CEST617752404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:13:59.802926064 CEST240461775103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:00.084580898 CEST617762404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:00.089750051 CEST240461776103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:00.091284037 CEST617762404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:00.091617107 CEST617762404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:00.096502066 CEST240461776103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:02.174622059 CEST240461776103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:02.175605059 CEST617762404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:02.175649881 CEST617762404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:02.180483103 CEST240461776103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:02.461214066 CEST617772404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:02.466169119 CEST240461777103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:02.466244936 CEST617772404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:02.479999065 CEST617772404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:02.484884977 CEST240461777103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:04.531608105 CEST240461777103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:04.533401012 CEST617772404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:04.533401012 CEST617772404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:04.538304090 CEST240461777103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:04.803447962 CEST617782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:04.808564901 CEST240461778103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:04.808670998 CEST617782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:04.808995962 CEST617782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:04.813802958 CEST240461778103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:06.879102945 CEST240461778103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:06.880824089 CEST617782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:06.880892038 CEST617782404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:06.885759115 CEST240461778103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:07.147811890 CEST617792404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:07.152806997 CEST240461779103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:07.152895927 CEST617792404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:07.153196096 CEST617792404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:07.158025026 CEST240461779103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:09.219321966 CEST240461779103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:09.219465017 CEST617792404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:09.219506025 CEST617792404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:09.224379063 CEST240461779103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:09.475173950 CEST617802404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:09.480129004 CEST240461780103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:09.480225086 CEST617802404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:09.480523109 CEST617802404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:09.485404015 CEST240461780103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:11.530195951 CEST240461780103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:11.530283928 CEST617802404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:11.530329943 CEST617802404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:11.535285950 CEST240461780103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:11.787714005 CEST617812404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:11.794187069 CEST240461781103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:11.794290066 CEST617812404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:11.794657946 CEST617812404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:11.799885988 CEST240461781103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:13.862768888 CEST240461781103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:13.862895966 CEST617812404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:13.862895966 CEST617812404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:13.867789984 CEST240461781103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:14.100280046 CEST617822404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:14.105345964 CEST240461782103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:14.105441093 CEST617822404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:14.105753899 CEST617822404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:14.110574961 CEST240461782103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:16.177635908 CEST240461782103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:16.177720070 CEST617822404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:16.177755117 CEST617822404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:16.182794094 CEST240461782103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:16.413017988 CEST617832404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:16.418883085 CEST240461783103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:16.418983936 CEST617832404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:16.419342041 CEST617832404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:16.424448013 CEST240461783103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:18.523839951 CEST240461783103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:18.525337934 CEST617832404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:18.529231071 CEST617832404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:18.534693956 CEST240461783103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:18.756485939 CEST617842404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:18.761485100 CEST240461784103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:18.761567116 CEST617842404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:18.762001991 CEST617842404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:18.766897917 CEST240461784103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:20.813721895 CEST240461784103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:20.816951990 CEST617842404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:20.816983938 CEST617842404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:20.824161053 CEST240461784103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:21.038289070 CEST617852404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:21.047322989 CEST240461785103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:21.047491074 CEST617852404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:21.047770023 CEST617852404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:21.053390026 CEST240461785103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:23.118664980 CEST240461785103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:23.121311903 CEST617852404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:23.121351004 CEST617852404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:23.126255035 CEST240461785103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:23.337416887 CEST617862404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:23.342446089 CEST240461786103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:23.342577934 CEST617862404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:23.342991114 CEST617862404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:23.347827911 CEST240461786103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:25.389691114 CEST240461786103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:25.390435934 CEST617862404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:25.390489101 CEST617862404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:25.395318985 CEST240461786103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:25.600342035 CEST617872404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:25.605252028 CEST240461787103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:25.605334044 CEST617872404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:25.605662107 CEST617872404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:25.610445023 CEST240461787103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:27.655268908 CEST240461787103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:27.657299042 CEST617872404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:27.657352924 CEST617872404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:27.662190914 CEST240461787103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:27.850143909 CEST617882404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:27.855138063 CEST240461788103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:27.855237007 CEST617882404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:27.855528116 CEST617882404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:27.860538006 CEST240461788103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:30.172198057 CEST240461788103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:30.172255993 CEST240461788103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:30.172365904 CEST617882404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:30.172399044 CEST617882404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:30.178257942 CEST240461788103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:30.365715981 CEST617892404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:30.370908976 CEST240461789103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:30.371428967 CEST617892404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:30.371665955 CEST617892404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:30.376723051 CEST240461789103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:32.451641083 CEST240461789103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:32.451728106 CEST617892404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:32.451728106 CEST617892404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:32.456670046 CEST240461789103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:32.631474972 CEST617902404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:32.636465073 CEST240461790103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:32.636609077 CEST617902404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:32.637049913 CEST617902404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:32.641922951 CEST240461790103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:34.708257914 CEST240461790103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:34.708388090 CEST617902404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:34.708478928 CEST617902404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:34.713370085 CEST240461790103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:34.881614923 CEST617912404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:34.886470079 CEST240461791103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:34.889312983 CEST617912404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:34.889651060 CEST617912404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:34.894973040 CEST240461791103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:36.956710100 CEST240461791103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:36.961620092 CEST617912404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:36.961620092 CEST617912404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:36.966609001 CEST240461791103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:37.131403923 CEST617922404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:37.136477947 CEST240461792103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:37.137336969 CEST617922404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:37.138746023 CEST617922404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:37.143663883 CEST240461792103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:39.188745975 CEST240461792103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:39.191428900 CEST617922404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:39.197256088 CEST617922404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:39.202214956 CEST240461792103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:39.365927935 CEST617932404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:39.370908022 CEST240461793103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:39.371371031 CEST617932404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:39.371649027 CEST617932404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:39.376492977 CEST240461793103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:41.438457966 CEST240461793103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:41.438873053 CEST617932404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:41.438956022 CEST617932404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:41.443764925 CEST240461793103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:41.631972075 CEST617942404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:41.637028933 CEST240461794103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:41.639410019 CEST617942404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:41.639739990 CEST617942404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:41.644830942 CEST240461794103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:43.702682972 CEST240461794103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:43.702755928 CEST617942404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:43.702805042 CEST617942404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:43.707564116 CEST240461794103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:43.865730047 CEST617952404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:43.870667934 CEST240461795103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:43.871334076 CEST617952404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:43.871582031 CEST617952404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:43.876364946 CEST240461795103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:46.657186985 CEST240461795103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:46.657330036 CEST617952404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:46.657366991 CEST240461795103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:46.657521963 CEST240461795103.186.117.77192.168.2.11
                            Sep 26, 2024 15:14:46.657541037 CEST617952404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:46.657593966 CEST617952404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:46.657668114 CEST617952404192.168.2.11103.186.117.77
                            Sep 26, 2024 15:14:46.662309885 CEST240461795103.186.117.77192.168.2.11
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 26, 2024 15:10:41.183254004 CEST5772053192.168.2.111.1.1.1
                            Sep 26, 2024 15:10:41.500540018 CEST53577201.1.1.1192.168.2.11
                            Sep 26, 2024 15:11:01.138025999 CEST53599811.1.1.1192.168.2.11
                            Sep 26, 2024 15:11:03.637814045 CEST53536431.1.1.1192.168.2.11
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Sep 26, 2024 15:10:41.183254004 CEST192.168.2.111.1.1.10x4e8dStandard query (0)www.projectusf.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Sep 26, 2024 15:10:41.500540018 CEST1.1.1.1192.168.2.110x4e8dNo error (0)www.projectusf.com103.186.117.77A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:09:10:38
                            Start date:26/09/2024
                            Path:C:\Users\user\Desktop\Quote.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Quote.exe"
                            Imagebase:0xa90000
                            File size:937'472 bytes
                            MD5 hash:0B18DE9B2B7F17FC93796EABEE8D26DD
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1539767493.000000000499B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1539767493.0000000003E99000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:09:10:39
                            Start date:26/09/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"
                            Imagebase:0x660000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:09:10:39
                            Start date:26/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff68cce0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:09:10:39
                            Start date:26/09/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpCCF1.tmp"
                            Imagebase:0x100000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:09:10:39
                            Start date:26/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff68cce0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:09:10:40
                            Start date:26/09/2024
                            Path:C:\Users\user\Desktop\Quote.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Quote.exe"
                            Imagebase:0xae0000
                            File size:937'472 bytes
                            MD5 hash:0B18DE9B2B7F17FC93796EABEE8D26DD
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3977872276.00000000011CA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Target ID:8
                            Start time:09:10:41
                            Start date:26/09/2024
                            Path:C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                            Imagebase:0xa10000
                            File size:937'472 bytes
                            MD5 hash:0B18DE9B2B7F17FC93796EABEE8D26DD
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            Reputation:low
                            Has exited:true

                            Target ID:9
                            Start time:09:10:41
                            Start date:26/09/2024
                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                            Imagebase:0x7ff6220e0000
                            File size:496'640 bytes
                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:10
                            Start time:09:10:44
                            Start date:26/09/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OlhQyptevOgDP" /XML "C:\Users\user\AppData\Local\Temp\tmpDD4C.tmp"
                            Imagebase:0x100000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:11
                            Start time:09:10:44
                            Start date:26/09/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff68cce0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:09:10:44
                            Start date:26/09/2024
                            Path:C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe"
                            Imagebase:0x9c0000
                            File size:937'472 bytes
                            MD5 hash:0B18DE9B2B7F17FC93796EABEE8D26DD
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.1577837747.0000000001087000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:9.8%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:4.3%
                              Total number of Nodes:327
                              Total number of Limit Nodes:15
                              execution_graph 45752 54b82f8 45753 54b8325 45752->45753 45768 54b7d4c 45753->45768 45755 54b83b9 45756 54b7d4c 3 API calls 45755->45756 45757 54b83eb 45756->45757 45774 54b7d5c 45757->45774 45759 54b841d 45760 54b7d4c 3 API calls 45759->45760 45761 54b8681 45760->45761 45762 54b7d5c 3 API calls 45761->45762 45763 54b86b3 45762->45763 45764 54b7d4c 3 API calls 45763->45764 45765 54b882e 45764->45765 45766 54b7d4c 3 API calls 45765->45766 45767 54b8860 45766->45767 45769 54b7d57 45768->45769 45779 1407100 45769->45779 45783 14076f7 45769->45783 45787 14076e0 45769->45787 45770 54ba905 45770->45755 45775 54b7d67 45774->45775 45777 1407130 3 API calls 45775->45777 45778 140866a 3 API calls 45775->45778 45776 54bb034 45776->45759 45777->45776 45778->45776 45780 140710b 45779->45780 45781 1407130 3 API calls 45780->45781 45782 14077ad 45781->45782 45782->45770 45784 1407702 45783->45784 45785 1407130 3 API calls 45784->45785 45786 14077ad 45785->45786 45786->45770 45789 14076e3 45787->45789 45788 14076eb 45788->45770 45789->45788 45790 1407130 3 API calls 45789->45790 45791 14077ad 45790->45791 45791->45770 45572 54e3a68 45574 54e3a76 45572->45574 45573 54e3a7e 45574->45573 45577 54e33a4 45574->45577 45578 54e33af 45577->45578 45582 1407130 45578->45582 45589 140866a 45578->45589 45579 54e3b4f 45583 140713b 45582->45583 45585 140892b 45583->45585 45596 140afe2 45583->45596 45584 1408969 45584->45579 45585->45584 45600 140d0d0 45585->45600 45605 140d0c0 45585->45605 45590 1408678 45589->45590 45592 140892b 45590->45592 45593 140afe2 GetModuleHandleW 45590->45593 45591 1408969 45591->45579 45592->45591 45594 140d0c0 3 API calls 45592->45594 45595 140d0d0 3 API calls 45592->45595 45593->45592 45594->45591 45595->45591 45610 140b000 45596->45610 45613 140b010 45596->45613 45597 140afee 45597->45585 45601 140d0f1 45600->45601 45602 140d115 45601->45602 45621 140d390 45601->45621 45625 140d3a0 45601->45625 45602->45584 45606 140d0f1 45605->45606 45607 140d115 45606->45607 45608 140d390 3 API calls 45606->45608 45609 140d3a0 3 API calls 45606->45609 45607->45584 45608->45607 45609->45607 45616 140b0f8 45610->45616 45611 140b01f 45611->45597 45614 140b01f 45613->45614 45615 140b0f8 GetModuleHandleW 45613->45615 45614->45597 45615->45614 45617 140b13c 45616->45617 45618 140b119 45616->45618 45617->45611 45618->45617 45619 140b340 GetModuleHandleW 45618->45619 45620 140b36d 45619->45620 45620->45611 45624 140d3ad 45621->45624 45622 140d3e7 45622->45602 45624->45622 45629 140b688 45624->45629 45626 140d3ad 45625->45626 45627 140d3e7 45626->45627 45628 140b688 3 API calls 45626->45628 45627->45602 45628->45627 45630 140b693 45629->45630 45632 140e100 45630->45632 45633 140dcc0 45630->45633 45632->45632 45634 140dccb 45633->45634 45635 1407130 3 API calls 45634->45635 45636 140e16f 45635->45636 45640 54b0006 45636->45640 45645 54b0040 45636->45645 45637 140e1a9 45637->45632 45642 54b0040 45640->45642 45641 54b007d 45641->45637 45642->45641 45651 54b0e98 45642->45651 45656 54b0e87 45642->45656 45646 54b0071 45645->45646 45648 54b0171 45645->45648 45647 54b007d 45646->45647 45649 54b0e98 2 API calls 45646->45649 45650 54b0e87 2 API calls 45646->45650 45647->45637 45648->45637 45649->45648 45650->45648 45652 54b0ec3 45651->45652 45653 54b0f72 45652->45653 45662 54b1d50 45652->45662 45667 54b1d80 45652->45667 45657 54b0e79 45656->45657 45658 54b0e92 45656->45658 45657->45641 45659 54b0f72 45658->45659 45660 54b1d50 2 API calls 45658->45660 45661 54b1d80 2 API calls 45658->45661 45660->45659 45661->45659 45663 54b1d80 45662->45663 45671 54b1dd0 45663->45671 45675 54b1dc4 45663->45675 45669 54b1dd0 CreateWindowExW 45667->45669 45670 54b1dc4 CreateWindowExW 45667->45670 45668 54b1db5 45668->45653 45669->45668 45670->45668 45672 54b1e38 CreateWindowExW 45671->45672 45674 54b1ef4 45672->45674 45676 54b1e38 CreateWindowExW 45675->45676 45678 54b1ef4 45676->45678 45408 7330c74 45409 7330bdc 45408->45409 45410 7330beb 45408->45410 45409->45410 45414 7333490 45409->45414 45430 73334ee 45409->45430 45447 7333480 45409->45447 45415 73334aa 45414->45415 45428 73334ce 45415->45428 45463 7333956 45415->45463 45469 7333b2c 45415->45469 45474 7333c8e 45415->45474 45480 7333889 45415->45480 45487 7333c4b 45415->45487 45491 733386b 45415->45491 45496 733392b 45415->45496 45501 7334325 45415->45501 45506 73339c0 45415->45506 45514 7333e61 45415->45514 45519 7334198 45415->45519 45524 7334019 45415->45524 45528 73338f6 45415->45528 45428->45410 45431 733347c 45430->45431 45432 73334f1 45430->45432 45433 73334ce 45431->45433 45434 7333956 2 API calls 45431->45434 45435 73338f6 2 API calls 45431->45435 45436 7334019 2 API calls 45431->45436 45437 7334198 2 API calls 45431->45437 45438 7333e61 2 API calls 45431->45438 45439 73339c0 4 API calls 45431->45439 45440 7334325 2 API calls 45431->45440 45441 733392b 2 API calls 45431->45441 45442 733386b 2 API calls 45431->45442 45443 7333c4b 2 API calls 45431->45443 45444 7333889 2 API calls 45431->45444 45445 7333c8e 2 API calls 45431->45445 45446 7333b2c 2 API calls 45431->45446 45432->45410 45433->45410 45434->45433 45435->45433 45436->45433 45437->45433 45438->45433 45439->45433 45440->45433 45441->45433 45442->45433 45443->45433 45444->45433 45445->45433 45446->45433 45448 7333485 45447->45448 45449 73334ce 45448->45449 45450 7333956 2 API calls 45448->45450 45451 73338f6 2 API calls 45448->45451 45452 7334019 2 API calls 45448->45452 45453 7334198 2 API calls 45448->45453 45454 7333e61 2 API calls 45448->45454 45455 73339c0 4 API calls 45448->45455 45456 7334325 2 API calls 45448->45456 45457 733392b 2 API calls 45448->45457 45458 733386b 2 API calls 45448->45458 45459 7333c4b 2 API calls 45448->45459 45460 7333889 2 API calls 45448->45460 45461 7333c8e 2 API calls 45448->45461 45462 7333b2c 2 API calls 45448->45462 45449->45410 45450->45449 45451->45449 45452->45449 45453->45449 45454->45449 45455->45449 45456->45449 45457->45449 45458->45449 45459->45449 45460->45449 45461->45449 45462->45449 45464 7333966 45463->45464 45465 73338ff 45463->45465 45464->45428 45465->45464 45533 7330533 45465->45533 45537 7330538 45465->45537 45466 7334211 45470 73338ff 45469->45470 45472 7330533 WriteProcessMemory 45470->45472 45473 7330538 WriteProcessMemory 45470->45473 45471 7334211 45472->45471 45473->45471 45475 73338ff 45474->45475 45476 7333d96 45475->45476 45478 7330533 WriteProcessMemory 45475->45478 45479 7330538 WriteProcessMemory 45475->45479 45476->45428 45477 7334211 45478->45477 45479->45477 45481 733387b 45480->45481 45484 73307b4 CreateProcessA 45480->45484 45541 73307c0 45480->45541 45482 73343bc 45481->45482 45485 73307c0 CreateProcessA 45481->45485 45545 73307b4 45481->45545 45482->45428 45484->45481 45485->45481 45489 7330533 WriteProcessMemory 45487->45489 45490 7330538 WriteProcessMemory 45487->45490 45488 7333c6f 45489->45488 45490->45488 45492 733387b 45491->45492 45493 73343bc 45492->45493 45494 73307c0 CreateProcessA 45492->45494 45495 73307b4 CreateProcessA 45492->45495 45493->45428 45494->45492 45495->45492 45497 733393b 45496->45497 45499 7330533 WriteProcessMemory 45497->45499 45500 7330538 WriteProcessMemory 45497->45500 45498 7333be5 45498->45428 45499->45498 45500->45498 45503 733387b 45501->45503 45502 73343bc 45502->45428 45503->45501 45503->45502 45504 73307c0 CreateProcessA 45503->45504 45505 73307b4 CreateProcessA 45503->45505 45504->45503 45505->45503 45549 7330623 45506->45549 45553 7330628 45506->45553 45507 7333a67 45507->45428 45508 73338ff 45508->45507 45512 7330533 WriteProcessMemory 45508->45512 45513 7330538 WriteProcessMemory 45508->45513 45509 7334211 45512->45509 45513->45509 45515 73338ff 45514->45515 45515->45514 45517 7330533 WriteProcessMemory 45515->45517 45518 7330538 WriteProcessMemory 45515->45518 45516 7334211 45517->45516 45518->45516 45520 733419c 45519->45520 45522 7330533 WriteProcessMemory 45520->45522 45523 7330538 WriteProcessMemory 45520->45523 45521 7334211 45522->45521 45523->45521 45557 7330470 45524->45557 45561 7330478 45524->45561 45525 7334037 45529 73338ff 45528->45529 45531 7330533 WriteProcessMemory 45529->45531 45532 7330538 WriteProcessMemory 45529->45532 45530 7334211 45531->45530 45532->45530 45534 7330538 WriteProcessMemory 45533->45534 45536 73305d7 45534->45536 45536->45466 45538 7330580 WriteProcessMemory 45537->45538 45540 73305d7 45538->45540 45540->45466 45542 7330849 45541->45542 45542->45542 45543 73309ae CreateProcessA 45542->45543 45544 7330a0b 45543->45544 45546 7330849 CreateProcessA 45545->45546 45548 7330a0b 45546->45548 45550 7330628 ReadProcessMemory 45549->45550 45552 73306b7 45550->45552 45552->45508 45554 7330673 ReadProcessMemory 45553->45554 45556 73306b7 45554->45556 45556->45508 45558 73304b8 VirtualAllocEx 45557->45558 45560 73304f5 45558->45560 45560->45525 45562 73304b8 VirtualAllocEx 45561->45562 45564 73304f5 45562->45564 45564->45525 45792 140d4b8 45793 140d4fe 45792->45793 45797 140d688 45793->45797 45800 140d698 45793->45800 45794 140d5eb 45803 140b750 45797->45803 45801 140b750 DuplicateHandle 45800->45801 45802 140d6c6 45800->45802 45801->45802 45802->45794 45804 140d700 DuplicateHandle 45803->45804 45805 140d6c6 45804->45805 45805->45794 45679 135d01c 45680 135d034 45679->45680 45681 135d08e 45680->45681 45686 54b1f7a 45680->45686 45691 54b2cf8 45680->45691 45697 54b2ce8 45680->45697 45703 54b1f88 45680->45703 45687 54b1f88 45686->45687 45689 54b2ce8 2 API calls 45687->45689 45690 54b2cf8 2 API calls 45687->45690 45688 54b1fcf 45688->45681 45689->45688 45690->45688 45692 54b2d25 45691->45692 45693 54b2d57 45692->45693 45708 54b2e80 45692->45708 45713 54b2e70 45692->45713 45718 54b2f4c 45692->45718 45699 54b2d25 45697->45699 45698 54b2d57 45699->45698 45700 54b2f4c 2 API calls 45699->45700 45701 54b2e70 2 API calls 45699->45701 45702 54b2e80 2 API calls 45699->45702 45700->45698 45701->45698 45702->45698 45704 54b1fae 45703->45704 45706 54b2ce8 2 API calls 45704->45706 45707 54b2cf8 2 API calls 45704->45707 45705 54b1fcf 45705->45681 45706->45705 45707->45705 45710 54b2e94 45708->45710 45709 54b2f20 45709->45693 45724 54b2f38 45710->45724 45727 54b2f2a 45710->45727 45715 54b2e80 45713->45715 45714 54b2f20 45714->45693 45716 54b2f2a 2 API calls 45715->45716 45717 54b2f38 2 API calls 45715->45717 45716->45714 45717->45714 45719 54b2f0a 45718->45719 45720 54b2f5a 45718->45720 45722 54b2f2a 2 API calls 45719->45722 45723 54b2f38 2 API calls 45719->45723 45721 54b2f20 45721->45693 45722->45721 45723->45721 45725 54b2f49 45724->45725 45731 54b4371 45724->45731 45725->45709 45728 54b2f38 45727->45728 45729 54b2f49 45728->45729 45730 54b4371 2 API calls 45728->45730 45729->45709 45730->45729 45732 54b438a 45731->45732 45733 54b437a 45731->45733 45732->45725 45736 54b4390 45733->45736 45740 54b43a0 45733->45740 45737 54b43e2 45736->45737 45739 54b43e9 45736->45739 45738 54b443a CallWindowProcW 45737->45738 45737->45739 45738->45739 45739->45732 45741 54b43e2 45740->45741 45743 54b43e9 45740->45743 45742 54b443a CallWindowProcW 45741->45742 45741->45743 45742->45743 45743->45732 45565 7334628 45566 73347b3 45565->45566 45568 733464e 45565->45568 45568->45566 45569 7332c18 45568->45569 45570 73348a8 PostMessageW 45569->45570 45571 7334914 45570->45571 45571->45568 45744 54e46a0 45747 54e3414 45744->45747 45746 54e46bf 45748 54e341f 45747->45748 45750 1407130 3 API calls 45748->45750 45751 140866a 3 API calls 45748->45751 45749 54e4744 45749->45746 45750->45749 45751->45749 45806 54e67f0 45809 54e54f8 45806->45809 45808 54e67fd 45810 54e5503 45809->45810 45812 1407100 3 API calls 45810->45812 45813 14076e0 3 API calls 45810->45813 45814 14076f7 3 API calls 45810->45814 45811 54e6994 45811->45808 45812->45811 45813->45811 45814->45811

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 395 54b82ea-54b8323 397 54b832a-54b839e 395->397 398 54b8325 395->398 406 54b83a8-54b83b4 call 54b7d4c 397->406 398->397 408 54b83b9-54b8402 call 54b7d4c 406->408 414 54b840c-54b8418 call 54b7d5c 408->414 416 54b841d-54b856c call 54b7d6c * 4 call 54b7d7c call 54b7d8c 414->416 442 54b8576-54b8582 call 54b7d9c 416->442 444 54b8587-54b86ae call 54b7d9c * 4 call 54b7d4c call 54b7d5c 442->444 468 54b86b3-54b86ca 444->468 470 54b86d0-54b8877 call 54b7d6c * 4 call 54b7d8c call 54b7d4c * 2 468->470 502 54b8881-54b888d call 54b7dac 470->502 504 54b8892-54b8924 call 54b7dbc * 2 502->504 515 54b892b-54b8944 504->515 517 54b894a-54b8954 515->517 518 54b895b-54b89b9 517->518 519 54b8956 517->519 523 54b89c0-54b89d9 call 54b7dcc 518->523 519->518 525 54b89de-54b89ea 523->525 526 54b89f2-54b8a04 525->526 527 54b8a0c-54b90c7 call 54b7ddc * 3 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7e2c call 54b7e3c call 54b7e4c call 54b7e5c call 54b7e6c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e7c call 54b7e1c call 54b7e8c call 54b7e9c call 54b7eac call 54b7ebc call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 526->527 622 54b90c9-54b90d5 527->622 623 54b90f1 527->623 625 54b90df-54b90e5 622->625 626 54b90d7-54b90dd 622->626 624 54b90f7-54ba8d2 call 54b7ef8 call 54b7f08 call 54b7f18 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f28 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7ddc * 2 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7e2c call 54b7e3c call 54b7e4c call 54b7e5c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e7c call 54b7e1c call 54b7e8c call 54b7e9c call 54b7eac call 54b7ebc call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f28 call 54b7ddc * 5 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7dec call 54b7dfc call 54b7f58 call 54b7e0c call 54b7e1c call 54b7f68 call 54b7f78 * 2 call 54b7f88 call 54b7f98 call 54b7fa8 call 54b7fb8 call 54b7fc8 call 54b7ddc * 5 call 54b7fd8 call 54b7dfc call 54b7fe8 call 54b7ff8 call 54b8008 * 4 623->624 627 54b90ef 625->627 626->627 627->624
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1542998002.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54b0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: Ppgq
                              • API String ID: 0-3003515940
                              • Opcode ID: c95ea6f835ac39c331b565ed2e4f08f19802204adeeee36a75da4328c5af72dd
                              • Instruction ID: ca065f4bafb5582be746937139ba4a52057237de45fae2122e61c3c3b66bece0
                              • Opcode Fuzzy Hash: c95ea6f835ac39c331b565ed2e4f08f19802204adeeee36a75da4328c5af72dd
                              • Instruction Fuzzy Hash: 3833D534A01219CFDBA5DB25C898AE9B7B6FF89300F5046E9D40D6B361DB71AE81CF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 949 54b82f8-54b8323 950 54b832a-54b8954 call 54b7d4c * 2 call 54b7d5c call 54b7d6c * 4 call 54b7d7c call 54b7d8c call 54b7d9c * 5 call 54b7d4c call 54b7d5c call 54b7d6c * 4 call 54b7d8c call 54b7d4c * 2 call 54b7dac call 54b7dbc * 2 949->950 951 54b8325 949->951 1071 54b895b-54b8a04 call 54b7dcc 950->1071 1072 54b8956 950->1072 951->950 1080 54b8a0c-54b90c7 call 54b7ddc * 3 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7e2c call 54b7e3c call 54b7e4c call 54b7e5c call 54b7e6c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e7c call 54b7e1c call 54b7e8c call 54b7e9c call 54b7eac call 54b7ebc call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 1071->1080 1072->1071 1175 54b90c9-54b90d5 1080->1175 1176 54b90f1 1080->1176 1178 54b90df-54b90e5 1175->1178 1179 54b90d7-54b90dd 1175->1179 1177 54b90f7-54ba8d2 call 54b7ef8 call 54b7f08 call 54b7f18 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f28 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f38 call 54b7f48 call 54b7ddc * 2 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7e2c call 54b7e3c call 54b7e4c call 54b7e5c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e7c call 54b7e1c call 54b7e8c call 54b7e9c call 54b7eac call 54b7ebc call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7ecc call 54b7ee8 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7f28 call 54b7ddc * 5 call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7dec call 54b7dfc call 54b7e0c call 54b7e1c call 54b7dec call 54b7dfc call 54b7f58 call 54b7e0c call 54b7e1c call 54b7f68 call 54b7f78 * 2 call 54b7f88 call 54b7f98 call 54b7fa8 call 54b7fb8 call 54b7fc8 call 54b7ddc * 5 call 54b7fd8 call 54b7dfc call 54b7fe8 call 54b7ff8 call 54b8008 * 4 1176->1177 1180 54b90ef 1178->1180 1179->1180 1180->1177
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1542998002.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54b0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: Ppgq
                              • API String ID: 0-3003515940
                              • Opcode ID: 4510d5fd3a9c63a9402be06291e4adb4ddfe1a65f2da59463d5d4fea03cc88cb
                              • Instruction ID: d300cbfeb6592a6153f59ed524d2c46eba49b2fe7e88def1d48d60c73016e705
                              • Opcode Fuzzy Hash: 4510d5fd3a9c63a9402be06291e4adb4ddfe1a65f2da59463d5d4fea03cc88cb
                              • Instruction Fuzzy Hash: 6D33C534A01219CFDBA5DB25C898AE9B7B6FF89300F5046E9D40D6B361DB71AE81CF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 294 54e6cf0-54e6d53 297 54e6d5e-54e6da4 294->297 298 54e6dac-54e6fae 297->298
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq
                              • API String ID: 0-2553504284
                              • Opcode ID: 7e4b87f4e3306d65b59cdce5967d3dfdfb6ad0df092cf58e6d51b56666aa39d6
                              • Instruction ID: a5b2a29d44db2c87491763b72ef5a59e28d831fcd8b62efb1fad9b35a9f29c5d
                              • Opcode Fuzzy Hash: 7e4b87f4e3306d65b59cdce5967d3dfdfb6ad0df092cf58e6d51b56666aa39d6
                              • Instruction Fuzzy Hash: 5F711F71E0031A8BDB04EFBAD9505DEB7B2FF95304F614B1AD0066B295EB707985CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 334 54e6d00-54e6da4 337 54e6dac-54e6fae 334->337
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq
                              • API String ID: 0-2553504284
                              • Opcode ID: 89578568701fddf52be658b3a08918a8fee8178eb867e176e0a6bb1b82bfdf14
                              • Instruction ID: b7105dcf61ba7edcc62e087560b75952acba566b74bf084a23c16c9b08745213
                              • Opcode Fuzzy Hash: 89578568701fddf52be658b3a08918a8fee8178eb867e176e0a6bb1b82bfdf14
                              • Instruction Fuzzy Hash: 23710B71E0031A8BDB08EFBAD95059EB7B2FF95304F614B1AD0066B295EB707985CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1502 54e0448-54e04aa call 54e0448 1507 54e04ac-54e04ae 1502->1507 1508 54e0510-54e053c 1502->1508 1509 54e04b4-54e04c0 1507->1509 1510 54e0543-54e054b 1507->1510 1508->1510 1515 54e04c6-54e04ff 1509->1515 1516 54e0552-54e056f 1509->1516 1510->1516 1544 54e0501 call 54e0a18 1515->1544 1545 54e0501 call 54e0a28 1515->1545 1523 54e0573-54e05b4 1516->1523 1531 54e05b6-54e068d 1523->1531 1525 54e0506-54e050f 1533 54e0693-54e06a1 1531->1533 1534 54e06aa-54e06f0 1533->1534 1535 54e06a3-54e06a9 1533->1535 1540 54e06fd 1534->1540 1541 54e06f2-54e06f5 1534->1541 1535->1534 1542 54e06fe 1540->1542 1541->1540 1542->1542 1544->1525 1545->1525
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: Hkq$Hkq
                              • API String ID: 0-2158860719
                              • Opcode ID: 00bcd4f29bc103251d5312d308f1b32ab7c360b8b64680d3eaf483ad41418809
                              • Instruction ID: f37e0a4ea41a26974d57c5eeb92fc68d474bd86b1fc37838292b0f3992dd16db
                              • Opcode Fuzzy Hash: 00bcd4f29bc103251d5312d308f1b32ab7c360b8b64680d3eaf483ad41418809
                              • Instruction Fuzzy Hash: FE816B70E002198FDF04DFA9C8946EEBBB6FF88310F24852AD419AB354DB749945CBA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1546 54ea8fc-54ebf04 1556 54ebf66-54ec04b call 54ea92c call 54e9ac8 call 54ea93c 1546->1556 1557 54ebf06-54ebf5e 1546->1557 1557->1556
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: $
                              • API String ID: 0-227171996
                              • Opcode ID: e0772e21d5758ecabe578d132e980200047d919899789f5bbba7bbfbbee05001
                              • Instruction ID: 3440e328ca0138d45a574abf748ef8bbdd0579a47e754db0c935afe7838678ed
                              • Opcode Fuzzy Hash: e0772e21d5758ecabe578d132e980200047d919899789f5bbba7bbfbbee05001
                              • Instruction Fuzzy Hash: FD61D231950701CFDB40EF2AD488556B7B5FF85314B818AAAD849AF326EB75F894CF80

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1570 54ebde3-54ebf04 1579 54ebf66-54ebfd9 call 54ea92c 1570->1579 1580 54ebf06-54ebf5e 1570->1580 1583 54ebfde-54ec04b call 54e9ac8 call 54ea93c 1579->1583 1580->1579
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: $
                              • API String ID: 0-227171996
                              • Opcode ID: 2fd4fd8e0d5a612348da0bcc55dd65151d4937399ad7675a53b43e6b14d9e20f
                              • Instruction ID: e9a8b4c8dcd53320bcc1e92d1bc6e0b5fc5d9f3d6f8e99bfe327e760c812b022
                              • Opcode Fuzzy Hash: 2fd4fd8e0d5a612348da0bcc55dd65151d4937399ad7675a53b43e6b14d9e20f
                              • Instruction Fuzzy Hash: 0861F231950701CFDB40EF2AD488656B7F5FF85314B818AA9D849AB326EB75F894CF80

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1621 73307b4-7330855 1623 7330857-7330861 1621->1623 1624 733088e-73308ae 1621->1624 1623->1624 1625 7330863-7330865 1623->1625 1631 73308b0-73308ba 1624->1631 1632 73308e7-7330916 1624->1632 1626 7330867-7330871 1625->1626 1627 7330888-733088b 1625->1627 1629 7330873 1626->1629 1630 7330875-7330884 1626->1630 1627->1624 1629->1630 1630->1630 1634 7330886 1630->1634 1631->1632 1633 73308bc-73308be 1631->1633 1640 7330918-7330922 1632->1640 1641 733094f-7330a09 CreateProcessA 1632->1641 1635 73308e1-73308e4 1633->1635 1636 73308c0-73308ca 1633->1636 1634->1627 1635->1632 1638 73308ce-73308dd 1636->1638 1639 73308cc 1636->1639 1638->1638 1642 73308df 1638->1642 1639->1638 1640->1641 1643 7330924-7330926 1640->1643 1652 7330a12-7330a98 1641->1652 1653 7330a0b-7330a11 1641->1653 1642->1635 1645 7330949-733094c 1643->1645 1646 7330928-7330932 1643->1646 1645->1641 1647 7330936-7330945 1646->1647 1648 7330934 1646->1648 1647->1647 1650 7330947 1647->1650 1648->1647 1650->1645 1663 7330a9a-7330a9e 1652->1663 1664 7330aa8-7330aac 1652->1664 1653->1652 1663->1664 1665 7330aa0 1663->1665 1666 7330aae-7330ab2 1664->1666 1667 7330abc-7330ac0 1664->1667 1665->1664 1666->1667 1670 7330ab4 1666->1670 1668 7330ac2-7330ac6 1667->1668 1669 7330ad0-7330ad4 1667->1669 1668->1669 1671 7330ac8 1668->1671 1672 7330ae6-7330aed 1669->1672 1673 7330ad6-7330adc 1669->1673 1670->1667 1671->1669 1674 7330b04 1672->1674 1675 7330aef-7330afe 1672->1675 1673->1672 1677 7330b05 1674->1677 1675->1674 1677->1677
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073309F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: abfafa9aa5abc11df11a5a337ab7f15641f18532d11022c5c39b1b6b811c061b
                              • Instruction ID: cfe47124126d106ed31e4a676de51bdca0dd9325f07d7f4f6a13bdf7d42074c7
                              • Opcode Fuzzy Hash: abfafa9aa5abc11df11a5a337ab7f15641f18532d11022c5c39b1b6b811c061b
                              • Instruction Fuzzy Hash: FAA15DB1D0021ADFEB24CF69C881BEDBBB2FF48310F1485A9D819A7250DB749985DF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1678 73307c0-7330855 1680 7330857-7330861 1678->1680 1681 733088e-73308ae 1678->1681 1680->1681 1682 7330863-7330865 1680->1682 1688 73308b0-73308ba 1681->1688 1689 73308e7-7330916 1681->1689 1683 7330867-7330871 1682->1683 1684 7330888-733088b 1682->1684 1686 7330873 1683->1686 1687 7330875-7330884 1683->1687 1684->1681 1686->1687 1687->1687 1691 7330886 1687->1691 1688->1689 1690 73308bc-73308be 1688->1690 1697 7330918-7330922 1689->1697 1698 733094f-7330a09 CreateProcessA 1689->1698 1692 73308e1-73308e4 1690->1692 1693 73308c0-73308ca 1690->1693 1691->1684 1692->1689 1695 73308ce-73308dd 1693->1695 1696 73308cc 1693->1696 1695->1695 1699 73308df 1695->1699 1696->1695 1697->1698 1700 7330924-7330926 1697->1700 1709 7330a12-7330a98 1698->1709 1710 7330a0b-7330a11 1698->1710 1699->1692 1702 7330949-733094c 1700->1702 1703 7330928-7330932 1700->1703 1702->1698 1704 7330936-7330945 1703->1704 1705 7330934 1703->1705 1704->1704 1707 7330947 1704->1707 1705->1704 1707->1702 1720 7330a9a-7330a9e 1709->1720 1721 7330aa8-7330aac 1709->1721 1710->1709 1720->1721 1722 7330aa0 1720->1722 1723 7330aae-7330ab2 1721->1723 1724 7330abc-7330ac0 1721->1724 1722->1721 1723->1724 1727 7330ab4 1723->1727 1725 7330ac2-7330ac6 1724->1725 1726 7330ad0-7330ad4 1724->1726 1725->1726 1728 7330ac8 1725->1728 1729 7330ae6-7330aed 1726->1729 1730 7330ad6-7330adc 1726->1730 1727->1724 1728->1726 1731 7330b04 1729->1731 1732 7330aef-7330afe 1729->1732 1730->1729 1734 7330b05 1731->1734 1732->1731 1734->1734
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073309F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: b55b01284fa85ab9c9be7caea978190db596d5485dd3430712b4d5cdac02515a
                              • Instruction ID: e4ceab57249666967b9bf75afab3890163734776cdd7b86b95c128e4e0761fc6
                              • Opcode Fuzzy Hash: b55b01284fa85ab9c9be7caea978190db596d5485dd3430712b4d5cdac02515a
                              • Instruction Fuzzy Hash: 7B915EB1D0021ADFEB24CF69C841BDDBBB2FF48314F1485A9D819A7290DB749985CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1735 140b0f8-140b117 1736 140b143-140b147 1735->1736 1737 140b119-140b126 call 140a48c 1735->1737 1738 140b149-140b153 1736->1738 1739 140b15b-140b19c 1736->1739 1742 140b128 1737->1742 1743 140b13c 1737->1743 1738->1739 1746 140b1a9-140b1b7 1739->1746 1747 140b19e-140b1a6 1739->1747 1791 140b12e call 140b7a0 1742->1791 1792 140b12e call 140b78f 1742->1792 1743->1736 1749 140b1b9-140b1be 1746->1749 1750 140b1db-140b1dd 1746->1750 1747->1746 1748 140b134-140b136 1748->1743 1751 140b278-140b338 1748->1751 1753 140b1c0-140b1c7 call 140a498 1749->1753 1754 140b1c9 1749->1754 1752 140b1e0-140b1e7 1750->1752 1786 140b340-140b36b GetModuleHandleW 1751->1786 1787 140b33a-140b33d 1751->1787 1757 140b1f4-140b1fb 1752->1757 1758 140b1e9-140b1f1 1752->1758 1756 140b1cb-140b1d9 1753->1756 1754->1756 1756->1752 1760 140b208-140b211 call 140a4a8 1757->1760 1761 140b1fd-140b205 1757->1761 1758->1757 1766 140b213-140b21b 1760->1766 1767 140b21e-140b223 1760->1767 1761->1760 1766->1767 1768 140b241-140b245 1767->1768 1769 140b225-140b22c 1767->1769 1793 140b248 call 140baa0 1768->1793 1794 140b248 call 140ba71 1768->1794 1769->1768 1771 140b22e-140b23e call 140a4b8 call 140a4c8 1769->1771 1771->1768 1774 140b24b-140b24e 1776 140b250-140b26e 1774->1776 1777 140b271-140b277 1774->1777 1776->1777 1788 140b374-140b388 1786->1788 1789 140b36d-140b373 1786->1789 1787->1786 1789->1788 1791->1748 1792->1748 1793->1774 1794->1774
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0140B35E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537267664.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1400000_Quote.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 2084660eccefaa0084cebc346ae1978478794522eb0a3dfb532b64a4b5ef469e
                              • Instruction ID: ece377e52638d74efcf9917042671795f59c252872143ca5265e42c2a8f4ca7b
                              • Opcode Fuzzy Hash: 2084660eccefaa0084cebc346ae1978478794522eb0a3dfb532b64a4b5ef469e
                              • Instruction Fuzzy Hash: 63814374A00B058FDB25DF2AD44575BBBF5FF88340F108A2ED44A9BBA0DB34E8458B94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1795 54b1dc4-54b1e36 1796 54b1e38-54b1e3e 1795->1796 1797 54b1e41-54b1e48 1795->1797 1796->1797 1798 54b1e4a-54b1e50 1797->1798 1799 54b1e53-54b1ef2 CreateWindowExW 1797->1799 1798->1799 1801 54b1efb-54b1f33 1799->1801 1802 54b1ef4-54b1efa 1799->1802 1806 54b1f40 1801->1806 1807 54b1f35-54b1f38 1801->1807 1802->1801 1808 54b1f41 1806->1808 1807->1806 1808->1808
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 054B1EE2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1542998002.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54b0000_Quote.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: 9313293a5091d316725c9566059654de8f9d476a4ff7a29d9b537b313787a7d5
                              • Instruction ID: 1998c618ca6c43c71a1bd9823bb826622d1056011824e4a3ecd480f2a5c797fb
                              • Opcode Fuzzy Hash: 9313293a5091d316725c9566059654de8f9d476a4ff7a29d9b537b313787a7d5
                              • Instruction Fuzzy Hash: 8251CDB1C00309DFDB14CF99C994ADEBBB5FF48310F24862AE819AB214D7B59885CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1809 54b1dd0-54b1e36 1810 54b1e38-54b1e3e 1809->1810 1811 54b1e41-54b1e48 1809->1811 1810->1811 1812 54b1e4a-54b1e50 1811->1812 1813 54b1e53-54b1ef2 CreateWindowExW 1811->1813 1812->1813 1815 54b1efb-54b1f33 1813->1815 1816 54b1ef4-54b1efa 1813->1816 1820 54b1f40 1815->1820 1821 54b1f35-54b1f38 1815->1821 1816->1815 1822 54b1f41 1820->1822 1821->1820 1822->1822
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 054B1EE2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1542998002.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54b0000_Quote.jbxd
                              Similarity
                              • API ID: CreateWindow
                              • String ID:
                              • API String ID: 716092398-0
                              • Opcode ID: b29a5c66496b2b7669a91f102edc45534884c1a06adc776f9825da271f3ac9c1
                              • Instruction ID: 9d45214236e216180389eb281cd5b054b5c0aff81bcb53710df0c05f45ac75f4
                              • Opcode Fuzzy Hash: b29a5c66496b2b7669a91f102edc45534884c1a06adc776f9825da271f3ac9c1
                              • Instruction Fuzzy Hash: 9941C0B1D10349DFDB14CF9AC994ADEBBB5FF48310F24812AE819AB210D7B19885CF90
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 014059C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537267664.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1400000_Quote.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: ccab427e6cfe7d944da7e1a3fb05ead89184b0e15be3444ca8db24956867e8a3
                              • Instruction ID: ee7e87a755676134c090fcf09c3eb0eee8e3c125c1f7a3e82eecbad48e28e381
                              • Opcode Fuzzy Hash: ccab427e6cfe7d944da7e1a3fb05ead89184b0e15be3444ca8db24956867e8a3
                              • Instruction Fuzzy Hash: 3841C2B0C00719CBDB25DFAAC885B9EBBB5FF49314F20806AD408AB251DB756946CF90
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 014059C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537267664.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1400000_Quote.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: cc632010bb620b0c3a393b64eb03bb8a6081a3060d5cc49f6ae64cbd723b29bc
                              • Instruction ID: 131377db2c803a6af7fc8742ecfeb1dbb08466e376a09f705c5f8608557daed2
                              • Opcode Fuzzy Hash: cc632010bb620b0c3a393b64eb03bb8a6081a3060d5cc49f6ae64cbd723b29bc
                              • Instruction Fuzzy Hash: E741E2B0C00719CFDB24DFAAC985B9EBBB5FF49304F20846AD408AB251DB756986CF50
                              APIs
                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 054B4461
                              Memory Dump Source
                              • Source File: 00000000.00000002.1542998002.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54b0000_Quote.jbxd
                              Similarity
                              • API ID: CallProcWindow
                              • String ID:
                              • API String ID: 2714655100-0
                              • Opcode ID: 4ea547ec895fbcc1219d9dcf1d85cb1d81b81f6682d20bb28bf5e927609ca095
                              • Instruction ID: 97587b683c3f67a7274bedd4081817bc97030c15eb9d9f87bda62bffe9b435c5
                              • Opcode Fuzzy Hash: 4ea547ec895fbcc1219d9dcf1d85cb1d81b81f6682d20bb28bf5e927609ca095
                              • Instruction Fuzzy Hash: 104138B4900349DFDB14CF99C488AAABBF6FF88314F248499D519AB321D774A845CFA1
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073305C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: efd3f64b995375b2ddfba775b93f3f51f012e0ee2a9092d52c5bc1b0fb5de392
                              • Instruction ID: 93cc4f73cf6dec731ae48ff1f8c93921132f5123d79f0515559b3b0b3dc7183c
                              • Opcode Fuzzy Hash: efd3f64b995375b2ddfba775b93f3f51f012e0ee2a9092d52c5bc1b0fb5de392
                              • Instruction Fuzzy Hash: E7216BB19003599FDB10CFA9C881BDEBBF5FF48320F14842AE918A7240D7789944CBA0
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073305C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: ee5064beafaf447868dd1d26795f5fa5bd3ce2d5ce7004d009719105870e676f
                              • Instruction ID: 0d0e909573bd65f4799b63e790f78287133979fc28c0ef1540934fdc124c1a1f
                              • Opcode Fuzzy Hash: ee5064beafaf447868dd1d26795f5fa5bd3ce2d5ce7004d009719105870e676f
                              • Instruction Fuzzy Hash: CF214CB1900359DFDB10DFA9C981BDEBBF5FF48320F10842AE919A7240D7789944CBA0
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0140D6C6,?,?,?,?,?), ref: 0140D787
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537267664.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1400000_Quote.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 9ef7b915dee68d7123ab24532cb3d7ae152416c4d2433f1bdac028eea0dbe3f3
                              • Instruction ID: c976aaef389a2e97071a016b9390a8b4cbcb9cd5cd57ebf3bc43aa526d50ffe0
                              • Opcode Fuzzy Hash: 9ef7b915dee68d7123ab24532cb3d7ae152416c4d2433f1bdac028eea0dbe3f3
                              • Instruction Fuzzy Hash: 4721B6B5D00248DFDB10CF9AD984AEEBBF5EB48320F14841AE918A7350D375A954CFA5
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0140D6C6,?,?,?,?,?), ref: 0140D787
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537267664.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1400000_Quote.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 124dd9f408713044463fee8a8aa51e9bfc2d549696c1680c4fa395fb71d15bed
                              • Instruction ID: 0f5e17a70f11bab933dd7994315eef96425aa27022b7cf2cfeaf9c2a484e860f
                              • Opcode Fuzzy Hash: 124dd9f408713044463fee8a8aa51e9bfc2d549696c1680c4fa395fb71d15bed
                              • Instruction Fuzzy Hash: D821E5B5D002489FDB10CF9AD984ADEBBF8EB48320F14841AE918A7350D374A944CFA5
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073306A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 57229af839cb579a716a6b150a70fa3a4e97832bcaa89f93c5eabe93900fba0a
                              • Instruction ID: cf5428cf9f71ca2eb5b5ad0df6e44dfbf458380a5e4e5052dd5ab419d8ed79bf
                              • Opcode Fuzzy Hash: 57229af839cb579a716a6b150a70fa3a4e97832bcaa89f93c5eabe93900fba0a
                              • Instruction Fuzzy Hash: CE213CB1D003599FDB14DF9AC885ADEFBF5FF88320F148429E919A7240D7799941CBA0
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073306A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 4d2d8683fadfdfd9c65b100f63e4b6b4ba242b66bdd7d45bee54f927a7b20b2b
                              • Instruction ID: 4ed62f672f78868f2f1fe00b6aabac94c8554e58d040cb6bb0574e3d5eedfc96
                              • Opcode Fuzzy Hash: 4d2d8683fadfdfd9c65b100f63e4b6b4ba242b66bdd7d45bee54f927a7b20b2b
                              • Instruction Fuzzy Hash: 6A213DB1D003599FDB10DF9AC840ADEFBF5FF88320F108429E519A7240D7799541CBA0
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073304E6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: f47714451a98a88c941fd43e562cab40d1d60932aff180ef7a146117b619c958
                              • Instruction ID: c3cc6e2894369a5ddff0397bd27b06f94d242bd9afdc137b9c4a88982c00bf74
                              • Opcode Fuzzy Hash: f47714451a98a88c941fd43e562cab40d1d60932aff180ef7a146117b619c958
                              • Instruction Fuzzy Hash: 28113AB59002498FDB20DFA9C945BEEBFF5EF48320F148819D919A7250CB799940CFA0
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073304E6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 0f828a6a5415e726b8c19c98bacff42a0aedf379801bfb8af14a6e07dfe79970
                              • Instruction ID: 6c3ac0b5a088972d02a37a66b5f602fff3ae86ca5504262e847a3de759ae2aa4
                              • Opcode Fuzzy Hash: 0f828a6a5415e726b8c19c98bacff42a0aedf379801bfb8af14a6e07dfe79970
                              • Instruction Fuzzy Hash: 661149719002499FDB20DFAAC844AEFBFF5EF88320F148819E519A7250CB759940CFA0
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 07334905
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: f872e7dce602b5ed3c46dd857f7aa2260456a73db6f4a34d80f4af53e09dbf1e
                              • Instruction ID: bd02786dc94acf4f04d2fb9d4ba5968d7d26c30e67538f75e8f61866ad7b4195
                              • Opcode Fuzzy Hash: f872e7dce602b5ed3c46dd857f7aa2260456a73db6f4a34d80f4af53e09dbf1e
                              • Instruction Fuzzy Hash: D31106B5800789DFDB20DF9AC885BEEBBF8EB58324F108459E558A7600C375A944CFA1
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0140B35E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537267664.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1400000_Quote.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 23584486b3b5edbe1fd4ca7f156d14881a122b5ec45a92d44151189de970c9ba
                              • Instruction ID: f4f2f3b1f7824acdc942cc22118bcf9b18171e9556208f10335fc2362b5a3dc7
                              • Opcode Fuzzy Hash: 23584486b3b5edbe1fd4ca7f156d14881a122b5ec45a92d44151189de970c9ba
                              • Instruction Fuzzy Hash: E71102B5C006498FDB14CF9AC444A9EFBF4EB88224F14842AD919A7350C375A545CFA5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 07334905
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: f121f4e6332d68cdbdc4a6f8d8942e6bf05db8e5499c8b58b690c12434aa8f89
                              • Instruction ID: 8c8aa1f04d056453a174cbde2d52f2d5f357c7a0e066ff00ee6a0ff34d3d6842
                              • Opcode Fuzzy Hash: f121f4e6332d68cdbdc4a6f8d8942e6bf05db8e5499c8b58b690c12434aa8f89
                              • Instruction Fuzzy Hash: E01103B5800349DFDB20CF9AC885BDEFBF8EB48324F148419E958A7200C379A944CFA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: (kq
                              • API String ID: 0-3643127487
                              • Opcode ID: fe442f490ab5939f7b9f856237f1dfda1a58a7795c454f6acf630c6f00a1b982
                              • Instruction ID: 2c9cb78083a70373fa75ea8a6b6f17b524013fe894588185687ab8af14654bbc
                              • Opcode Fuzzy Hash: fe442f490ab5939f7b9f856237f1dfda1a58a7795c454f6acf630c6f00a1b982
                              • Instruction Fuzzy Hash: 49513375B042598FCB05EB65C854AEEBBB6EF88310F1441AFD506AB395CF74AC05CBA0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: Tegq
                              • API String ID: 0-646574824
                              • Opcode ID: adfaf46d67113ec70ad75e35aa2924dc3e39de0531dd6274e342e1bd6a93205b
                              • Instruction ID: c594ae5fa34d865296f95054614872e26a244a4e3a90437f3626f2ae310f9d8c
                              • Opcode Fuzzy Hash: adfaf46d67113ec70ad75e35aa2924dc3e39de0531dd6274e342e1bd6a93205b
                              • Instruction Fuzzy Hash: 13419D75B002154FCB14DB79C8489BEBBF7EFC8221B25896AE419DB395EA3099058790
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: (kq
                              • API String ID: 0-3643127487
                              • Opcode ID: 875dec8d2faefc9076c9313d47863f389f891b54c353655806d70a194828a97b
                              • Instruction ID: 692c273d4fff38369dbbe95fc3549c0e02a2c0e9e93731dc8126edfdcb3035ae
                              • Opcode Fuzzy Hash: 875dec8d2faefc9076c9313d47863f389f891b54c353655806d70a194828a97b
                              • Instruction Fuzzy Hash: C721E331B042085FDB1C9BB998586AF7FEAEFC0201F24847E954AC7780DE30A8058761
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: Hkq
                              • API String ID: 0-3520182757
                              • Opcode ID: 664847668be2eb382ebba9dcb1bae8e4f7e9814058a2c35953a78c5fb539c236
                              • Instruction ID: 8bee9edccb4338f65f7d6dc0b025549533ceec3e505c5a62b22173388985cbe6
                              • Opcode Fuzzy Hash: 664847668be2eb382ebba9dcb1bae8e4f7e9814058a2c35953a78c5fb539c236
                              • Instruction Fuzzy Hash: 1B21E770B041195FD358EB7D88187AFBBABFFC1200F25C16E88199B395CE345C0583A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: Tegq
                              • API String ID: 0-646574824
                              • Opcode ID: 92795ba77696398408f114cdcb377441752ef91e721634f3f8ac740e5696a1ff
                              • Instruction ID: d402ae4805505baf7d2728d37eece33e1228b5f42e9ed9df3be31236d63ca54a
                              • Opcode Fuzzy Hash: 92795ba77696398408f114cdcb377441752ef91e721634f3f8ac740e5696a1ff
                              • Instruction Fuzzy Hash: 11117735F002198FCF55EFB999142EFB7B6BBC4211B50446AC405E7340EB319A01CB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: Tegq
                              • API String ID: 0-646574824
                              • Opcode ID: 70a46206412c5eff4f13fd32dc4b98d07ec0e9570bf305a3122d122a5a44a8d8
                              • Instruction ID: b191e9a8c22eedf9b303e555b6968139fc0006ec9cf0ae45d548dcee1b40a1d6
                              • Opcode Fuzzy Hash: 70a46206412c5eff4f13fd32dc4b98d07ec0e9570bf305a3122d122a5a44a8d8
                              • Instruction Fuzzy Hash: C0114C35B002198BCF54EBBA99046EFB7B6ABC4211B6041AAC405EB354EB329E01CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e407a243b8c8cc7509cc19b9c3888ffce367bc940605e4576252e165b96fb55c
                              • Instruction ID: 9c8ed53757bd323802f6e094d7b9cc5b4250447a9d2be69d057bbe6c3904401e
                              • Opcode Fuzzy Hash: e407a243b8c8cc7509cc19b9c3888ffce367bc940605e4576252e165b96fb55c
                              • Instruction Fuzzy Hash: FE42F731E10619CFCB14DF69C884AEDB7B1BF89305F1086AAD459BB351EB30AA95CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76e32a96e031ef98a780bb7233d1af86890d84e54c9728917c860673269d63c1
                              • Instruction ID: 5f5fcd5ec49c8100603f2966feb4ace0a15ce694b5dd2f85aa7e8838d160ab64
                              • Opcode Fuzzy Hash: 76e32a96e031ef98a780bb7233d1af86890d84e54c9728917c860673269d63c1
                              • Instruction Fuzzy Hash: EDE11831E006198FCB24DF69C894AEDB7B6BF49301F1086AAD459BB351EB30A995CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 128603170e38ba027ccb50ddede3c0fe4285fb867bdffc381a07c5174eaa6bec
                              • Instruction ID: 95207d5c03d6cd434f65b3f1d3c70dfa366813d3950332bc0f7df209dcaa466c
                              • Opcode Fuzzy Hash: 128603170e38ba027ccb50ddede3c0fe4285fb867bdffc381a07c5174eaa6bec
                              • Instruction Fuzzy Hash: FFC17134B006018FDB04EF7AD4986AA77A2FF99304F55857ED80A6F395EF70A885CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 28d3ca57dab12ed50411ab9b4dbd307829afc8d45de0af6d0984e3bab09d3fba
                              • Instruction ID: fbed48cab0e852b02807c4358b3ac1824537d3eaea089768fab61b151262ae7f
                              • Opcode Fuzzy Hash: 28d3ca57dab12ed50411ab9b4dbd307829afc8d45de0af6d0984e3bab09d3fba
                              • Instruction Fuzzy Hash: C2A16135B002018FDB04EF7AD49879A77A2FF89304F55857ED80AAF3A5DF71A8458B90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3b846424801a3bb5dbd814da6151072df2cde5916f9f9e26f0d4d61eef473bdc
                              • Instruction ID: 2bf500ef6e558066ab74bd33128e2fffeb3f049140fcb69b5764ebe6104dd1af
                              • Opcode Fuzzy Hash: 3b846424801a3bb5dbd814da6151072df2cde5916f9f9e26f0d4d61eef473bdc
                              • Instruction Fuzzy Hash: 4E519231A00205CFCF19EBA9D4946BEBBB6EFC4305F14856EE006AB395EF749946CB41
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9cc406c7cc8c141ddc364bf0390d5cc1e97d759f01084821be2decde8b169f14
                              • Instruction ID: dc6bec9b4ea04c42cb56c8b45ea05f6f006192ef81dcc95a944a25abd1228332
                              • Opcode Fuzzy Hash: 9cc406c7cc8c141ddc364bf0390d5cc1e97d759f01084821be2decde8b169f14
                              • Instruction Fuzzy Hash: 20518175A082099FDB21DBB6C4406EEB7FABF88211F60457FC50AD7380EB719946CB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2d3b6d2c848b7133d229d26bf22896012202f4ef5659e485603a6e36d2eb0329
                              • Instruction ID: b9800580a9901ce099b66c52d5a86b30a99cf6d02e4f9003c393cb08ad29779e
                              • Opcode Fuzzy Hash: 2d3b6d2c848b7133d229d26bf22896012202f4ef5659e485603a6e36d2eb0329
                              • Instruction Fuzzy Hash: CD51F434A10609CFCB04DF69C8989ADBBF6FF89705F1585AAE5069B371EB70A845CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bc4aff471326574cc3c3396d14c71024f8ed3f618b30d380a39db52d6857465b
                              • Instruction ID: ce13f1d5197f5e15ec877bcdbd6c05b45254fa5af276d22d22ffa944448eacf9
                              • Opcode Fuzzy Hash: bc4aff471326574cc3c3396d14c71024f8ed3f618b30d380a39db52d6857465b
                              • Instruction Fuzzy Hash: 2251C370A047198FCB14DF79D4545AEBBB2FF88314B14856ED40A9B350EB31A942CBC1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1299b1c51361db7568d8235dfc915ab3e36540028b29967a9fb651921a9c963f
                              • Instruction ID: 5a82e8ba7c65e9c41edf3651d9eec35ab7e12ea3a00ac1f4c043ab9fe83af636
                              • Opcode Fuzzy Hash: 1299b1c51361db7568d8235dfc915ab3e36540028b29967a9fb651921a9c963f
                              • Instruction Fuzzy Hash: 7151F534A10609CFCB04DF69C8989ADBBF6FF89701B1585AAE5069B371EB71EC45CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e1866cfb91c5f1b6e10b771869b2f44a2dbaa0f0606f878aebdb6040f39efdaa
                              • Instruction ID: 94395e0b24d462108f1d93ccf2cc9d2ba133ccb37bda546bbfe08f8ab4ce9dc0
                              • Opcode Fuzzy Hash: e1866cfb91c5f1b6e10b771869b2f44a2dbaa0f0606f878aebdb6040f39efdaa
                              • Instruction Fuzzy Hash: 7331AF30A12218DFCB18DFA1E5885EDBBB2FF85312F2189AAE45267654CB319C65CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a16345f4447ce0966e88efa23f8fa4ad1c17507442dc55e131ba250e55014a2f
                              • Instruction ID: 5b9baecb08ce69c5268cd783e78a94d2c9fa4b6b10ddee15cd324ab40e2d104b
                              • Opcode Fuzzy Hash: a16345f4447ce0966e88efa23f8fa4ad1c17507442dc55e131ba250e55014a2f
                              • Instruction Fuzzy Hash: C6413D34B142588FDB15DF6AC888EEEBBF6BF49605F5440AAE501EB361DB75D840CB10
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f8b36cbeaad14b434e8c006554a8d163a4bfb3bd94acf9d43532952874c24a90
                              • Instruction ID: 1acf1f30369e3fd7150e856b18c14453101a79db28e7505b9dc9ede23d0b40f9
                              • Opcode Fuzzy Hash: f8b36cbeaad14b434e8c006554a8d163a4bfb3bd94acf9d43532952874c24a90
                              • Instruction Fuzzy Hash: FF511535A01209AFDF14DF95D594BEEBBB2FF48311F2080AAE905AB351CB71AD41CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4e2e85808687e9fad24bbc472ab4549cec13d0d11741db963635c3a865150a06
                              • Instruction ID: aabe761f9ffab68f2718450dc77b5216b26576455b92a7a3b3a702cbe0157cfb
                              • Opcode Fuzzy Hash: 4e2e85808687e9fad24bbc472ab4549cec13d0d11741db963635c3a865150a06
                              • Instruction Fuzzy Hash: D641F934A042198FCF14EFA9C854BDEB7B1FF89715F1140AAE905AB3A1D735AC01CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 554dafa39553f29bd716e159316b9d08c3a9739db209e759177f143f82c47937
                              • Instruction ID: 7f473da28319f2fcca2b9876c10432a92e8f1cfa2d68d96e311c69c377140306
                              • Opcode Fuzzy Hash: 554dafa39553f29bd716e159316b9d08c3a9739db209e759177f143f82c47937
                              • Instruction Fuzzy Hash: 1F411B30A00205DFCB15EF6AD594ADEB7F2EF88304F10896DD41AAB3A5DB72AD45CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 47ffb461a3ff0af1cc8d1b9d7617c2bc236817e08ee3296697845906b9453ad0
                              • Instruction ID: 16825318815d3c64984c2f1b3ae266c4ac54695d4e56fb3dad011f5f905f132c
                              • Opcode Fuzzy Hash: 47ffb461a3ff0af1cc8d1b9d7617c2bc236817e08ee3296697845906b9453ad0
                              • Instruction Fuzzy Hash: ED413C70F012189FCB15DBAAD8886EEBBF2BF89301F14456AE106E7750DB349D42CB84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 765aaaf14f1b8865ac3f455df905ec6fa6dcc8022e752b9301ff49c23fe0e938
                              • Instruction ID: 8e38bdf7d4c9ca6330a52416289f44e5ab86b1e8097a70497829fd7860f84089
                              • Opcode Fuzzy Hash: 765aaaf14f1b8865ac3f455df905ec6fa6dcc8022e752b9301ff49c23fe0e938
                              • Instruction Fuzzy Hash: 50410C30A00205DFCB15EF6AD594A9EB7F2EF98304F10896DD41AAB3A5DB72AC45CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c86456ae09c653f4901ec5a8ffdeb0b7947fbefd5d9747c1964c665ce7530053
                              • Instruction ID: 4ef5433cf3d63be708680ab4bbdd30e0c953139e116bb5726174bf4acedbc0fa
                              • Opcode Fuzzy Hash: c86456ae09c653f4901ec5a8ffdeb0b7947fbefd5d9747c1964c665ce7530053
                              • Instruction Fuzzy Hash: 5F410A34A10709CFCB04EF78C884ADDBBB6FF89305F048559E51A6B365EB71A946CB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cedaa2ebeec47e26d6dcd27a7da8095e58793f3ce396716097ffde2c7dd6f4e1
                              • Instruction ID: 979f85c2a6d23125132a3b1a1580d2c5cc7d0e29e15100cd01df282d4df70d39
                              • Opcode Fuzzy Hash: cedaa2ebeec47e26d6dcd27a7da8095e58793f3ce396716097ffde2c7dd6f4e1
                              • Instruction Fuzzy Hash: 7E412D34A10709CFCB04EF78C4849EDBBB6FF89305F008559E11A6B365EB71A946CB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6eed9af22eefa112e3d587aed36db4ad03e1a9dbe1433eca6fbeaa8e8257e70a
                              • Instruction ID: 8c4f8793723548d802bda38a5302ab49b6de690dbb0707712e90f0c3230c6763
                              • Opcode Fuzzy Hash: 6eed9af22eefa112e3d587aed36db4ad03e1a9dbe1433eca6fbeaa8e8257e70a
                              • Instruction Fuzzy Hash: AB317471F001559BCF44DBBAC9589FFBFFAAFC4300B10442AA51AD3340EE7489058BA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 49bf7aa9458efca60805675c61e0e960bf7d84cc8e6abd7839ca5b2a461b2a1b
                              • Instruction ID: e85f5db06cc8ff18bdef0522538fd7b4fadd7550be7deb88f300f3cfce4642dd
                              • Opcode Fuzzy Hash: 49bf7aa9458efca60805675c61e0e960bf7d84cc8e6abd7839ca5b2a461b2a1b
                              • Instruction Fuzzy Hash: A841D2B1D00609CBDB10DF99C985ADDFBB5BF48304F24806AD419BB240D7B56A4ACF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e4d722adcbb0224a9fea7e6b51ba6efdf283abb2d6f37ce90aadc631a8542eda
                              • Instruction ID: 321237eba6351e6f68144da3e271701d3e705e6bef312ab1b02d646accb2128c
                              • Opcode Fuzzy Hash: e4d722adcbb0224a9fea7e6b51ba6efdf283abb2d6f37ce90aadc631a8542eda
                              • Instruction Fuzzy Hash: AE41C3B1D00609CBDB20DF9AC584ADEFFB5BF48314F24806AD419BB250D7B56A46CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 358a629b9ae7904ef2c0bf2e6b5c2ed1614f4521eadeb064f53fafbd115fbbe2
                              • Instruction ID: 2f14f140c0395e994f867cfc8c1bb004395390191b4545f714bf6c20221c9e8b
                              • Opcode Fuzzy Hash: 358a629b9ae7904ef2c0bf2e6b5c2ed1614f4521eadeb064f53fafbd115fbbe2
                              • Instruction Fuzzy Hash: 0F412C75A0020ADFCB44DF69D58499EFBB5FF49310B14C659E818AB315E730E985CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1b3b6230e1cda00f48cce6c41bd341ac3fc011133c02f003c91d6af49e462641
                              • Instruction ID: 91853c6cfab3f91eeb0c3e159f07473b1e58f7b712283128bb2132829ad7c19a
                              • Opcode Fuzzy Hash: 1b3b6230e1cda00f48cce6c41bd341ac3fc011133c02f003c91d6af49e462641
                              • Instruction Fuzzy Hash: DF314571A042598BCF02DBA5C850ADFBBBAAFD9300F4041BFD505B72A6DB74AD0487A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e02fbfa83cb1c065852055a3d6468d5bb816eb74000a7bd139a253fbce4ae5e7
                              • Instruction ID: 93075ea34d03ea84fc1a5742ea47300cdaf9ec72774a2e906382d1321310accf
                              • Opcode Fuzzy Hash: e02fbfa83cb1c065852055a3d6468d5bb816eb74000a7bd139a253fbce4ae5e7
                              • Instruction Fuzzy Hash: FE312672A042198BCF06DBA5C850EEFB7BAEFD8300F00417AD5097B395DB71AD0587A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5c8418f71489db497289752ba5fc40bf8892701b07fb605377b2acf734cfe5b2
                              • Instruction ID: d13559c9b5505d72493b0c1aac919d149af6a6a70af82174c4b6950ffccea13d
                              • Opcode Fuzzy Hash: 5c8418f71489db497289752ba5fc40bf8892701b07fb605377b2acf734cfe5b2
                              • Instruction Fuzzy Hash: A7318475A10301CBD704EF7AD8986A67766FF98310F498A7AD8096B345EF35A484CB60
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bbd07f314fd95f220e08b350ae1efae10f3350aa3423bc934bb66ae4e04db620
                              • Instruction ID: a9c97ab38d8a0f07c8e7d58a2e31bb4732b4ed88535a690ec272571ea5a31e6d
                              • Opcode Fuzzy Hash: bbd07f314fd95f220e08b350ae1efae10f3350aa3423bc934bb66ae4e04db620
                              • Instruction Fuzzy Hash: B1316D35B00219DFCF04EF65D8488DEB7B6FF89211B05866AE506AB351EB31A946CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 48b22526c9695738701d43568e89b8ace04d47c22a93c3ad061bb6bb33bc9f9f
                              • Instruction ID: 9486bab31d774a37b2b386c4d6dddccc2a88ec762e2dd32364a404349f5d41e8
                              • Opcode Fuzzy Hash: 48b22526c9695738701d43568e89b8ace04d47c22a93c3ad061bb6bb33bc9f9f
                              • Instruction Fuzzy Hash: 98411875A0020ADFCB44DF69D88499EFBB5FF89310B14C699E818AB311E730E985CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 82a8684fddd7b8760af15e90accdafd8367cbf534b343879430e9f099f3eafad
                              • Instruction ID: 78150b0b96f8925bd72cbb6925727235b3ebface910e10e1a8a1e8ae395de058
                              • Opcode Fuzzy Hash: 82a8684fddd7b8760af15e90accdafd8367cbf534b343879430e9f099f3eafad
                              • Instruction Fuzzy Hash: 0A31D472A042198BCF06DBA5C850AEFB7BAEFD8300F50457AD5057B395DB75AD0487A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f755533c14785f22652e01c9fd67f4014ff7651b4b71d4e67208760435b92b6
                              • Instruction ID: b86ba5ce9324aae45371ea7aeb0c1aa7599141fd04f32b8bd328ef2b36df71d8
                              • Opcode Fuzzy Hash: 6f755533c14785f22652e01c9fd67f4014ff7651b4b71d4e67208760435b92b6
                              • Instruction Fuzzy Hash: 0421BA363142018FD7149F6DD8845AD3BE6FF89722B1985F6E10ACF3A6DA35DC018790
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 95220b8b54c8b830f0b2c8d8833468ecc8b33e13fd83aa3b1c88dc67fe996625
                              • Instruction ID: b615d4a98fc995efc81fad4462cf5524f0b4a501efc823a19662f053b39a5877
                              • Opcode Fuzzy Hash: 95220b8b54c8b830f0b2c8d8833468ecc8b33e13fd83aa3b1c88dc67fe996625
                              • Instruction Fuzzy Hash: 9C3118357142158FDB14DF6AC888EADBBF6BF49606F5440AAE501DB3A1DB75DC40CB10
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a3b2ecd75806c49cf36c98440dfb9937ec0d35fe802ff3ad037f52b4822cafcd
                              • Instruction ID: 73aeb2b1fea445048ed5efd41e1ff05c6f0007f8cb4635b4c75fb0fd90c4d4e1
                              • Opcode Fuzzy Hash: a3b2ecd75806c49cf36c98440dfb9937ec0d35fe802ff3ad037f52b4822cafcd
                              • Instruction Fuzzy Hash: 3831B575A00301CBD705EF7AD8887967B66FF98210F498A7BDC096B345EB349484CB60
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5f7543a32a9c93dd99edb97333a53726b7c8f842743aaee4777c0652c3e4f278
                              • Instruction ID: 7c92a466aca3875709027df4e7591c1dbc9a67f927a6aace58658a63782b7c27
                              • Opcode Fuzzy Hash: 5f7543a32a9c93dd99edb97333a53726b7c8f842743aaee4777c0652c3e4f278
                              • Instruction Fuzzy Hash: AE318D71F002089FCB15DBBAD8846EEBBF2FF89311F14456AE506A7750EB309941CB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2a22f24f637fd8cf55a05abe8217cc00d3faad6d23d3ba2be5fa75ef37b0fbd9
                              • Instruction ID: c1db344990afd8aee27281b4ec1c97c5cb2ced9ee2e5ce8460ac36a75e471900
                              • Opcode Fuzzy Hash: 2a22f24f637fd8cf55a05abe8217cc00d3faad6d23d3ba2be5fa75ef37b0fbd9
                              • Instruction Fuzzy Hash: 1A214171B00115ABDB51DBAACC489FFBBFAEFC4300F14815BE519D3250EAB09A0587A1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 03994364b3a1a12b67fa8aaa738e849d81295e464fbb7594c13e143560dea33f
                              • Instruction ID: 301c44aa46f4d52eabc269798247d57f1297618b8785f5d0966596c96eb69dc2
                              • Opcode Fuzzy Hash: 03994364b3a1a12b67fa8aaa738e849d81295e464fbb7594c13e143560dea33f
                              • Instruction Fuzzy Hash: D7312132810B09DACB01AF69C8544EAF775FF95300B11975AE9596B221EB30E695CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a8ad34acbe304b33677be22c5c4409f05740e61a4e187e9a9c5e7486d05f5c5
                              • Instruction ID: 41af911e57051d8a9cff47a8737afb1d0e353ccbeda6035cc3a6a6c31e89f35c
                              • Opcode Fuzzy Hash: 3a8ad34acbe304b33677be22c5c4409f05740e61a4e187e9a9c5e7486d05f5c5
                              • Instruction Fuzzy Hash: 0621A635A002058FC715EB79C4485EBBBF6EF84214B1589AAD10ADB791EF71EC0A8B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fe42963deb96534a8496dbf994055977e9f2fe3081e3e03555e86a36c57358d0
                              • Instruction ID: 43a08d6cd24b11db10ac01794cb5e58a1576846ec78b93b0e2814f5ab632dfbc
                              • Opcode Fuzzy Hash: fe42963deb96534a8496dbf994055977e9f2fe3081e3e03555e86a36c57358d0
                              • Instruction Fuzzy Hash: A521D435B001148FCB08EF69D8549ED7BFAEB89621F1481ABD505EB351CE719C01CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b484ddb5f505324ccf8d6fffe901ad6b93b4b7714b91b826c106b20e374bad8f
                              • Instruction ID: 64098e47b19ba565f85545f14db7a362da90587dcdf3101a6ebe1183f4d680e0
                              • Opcode Fuzzy Hash: b484ddb5f505324ccf8d6fffe901ad6b93b4b7714b91b826c106b20e374bad8f
                              • Instruction Fuzzy Hash: DF21B531710B019BDB38CE78D486BA6B7F2FB85251F040E6AE4AACB741D770E8458B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6824f8593d014a82b5763af7b8200294e7a7df884aca43d9cf0a88bcbb079a61
                              • Instruction ID: 69bb0b7c8f995c870e7ad9426ae610f6b87494a5eac838f0d180cf907028e45f
                              • Opcode Fuzzy Hash: 6824f8593d014a82b5763af7b8200294e7a7df884aca43d9cf0a88bcbb079a61
                              • Instruction Fuzzy Hash: FA311634A012099FDB14DF95D584BEEBBF2BF48310F1480A9E909AB351CB71AD41CF61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a3c6481fe4c784ab5ef5fd726425cb430ea7fc2126778713fa7364d8e3c1110
                              • Instruction ID: 1237468023d6551f33ed6e0edee2eeb49bf8ab45ad949fa8cf9ad4309501b1b6
                              • Opcode Fuzzy Hash: 3a3c6481fe4c784ab5ef5fd726425cb430ea7fc2126778713fa7364d8e3c1110
                              • Instruction Fuzzy Hash: C021F771714B018FDB39CF78D446BA6B7F2BB45241F040E6AE0AACB741D774E8458B51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 36921896cd59e7a31aef9bce38dfae614641c21453f7ee47d65440c20324bec6
                              • Instruction ID: b0546e638d6e91637160913b5a238ff5eba75ad387a0de495a832a8c67afaaf5
                              • Opcode Fuzzy Hash: 36921896cd59e7a31aef9bce38dfae614641c21453f7ee47d65440c20324bec6
                              • Instruction Fuzzy Hash: C8312132D10B0ADECB01AFB9C854499F775FF95300B11CB5AE9596B221FB30E695CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 69543dc17b4a103283ae05c8951b395317d3d9ae2de6fd09a51539f34f8781d9
                              • Instruction ID: 9bd4b1abaf183d9c9b5004ad711a02a1813bf0813519dd62efb4f48378a5a200
                              • Opcode Fuzzy Hash: 69543dc17b4a103283ae05c8951b395317d3d9ae2de6fd09a51539f34f8781d9
                              • Instruction Fuzzy Hash: 7C214C303002108FCB19DB3EC454A6A77EAEF86615B2484BEE506CB3A1DB72EC42CB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537044016.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_135d000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a24a48d3e34c8e0987d9932c2af4d5a663b90ed3469e870b18857aef5fcb670e
                              • Instruction ID: 77d6aede0946e01f03c53fd088a26c20cdc499ebac8980ad527878673300a607
                              • Opcode Fuzzy Hash: a24a48d3e34c8e0987d9932c2af4d5a663b90ed3469e870b18857aef5fcb670e
                              • Instruction Fuzzy Hash: D6210771504204DFDB45DF98D5C0F26BBA5FB88B28F24C56DED094B252C336D446CA61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537044016.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_135d000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7435e89189380de37e08bb750e5ffc8567b1f81acf87fb4216ce71fce0d75cb7
                              • Instruction ID: e1854d7c9971fdbe277b40192ba22e151082638bbdfbab4c21dbc334adf105ac
                              • Opcode Fuzzy Hash: 7435e89189380de37e08bb750e5ffc8567b1f81acf87fb4216ce71fce0d75cb7
                              • Instruction Fuzzy Hash: 37212271604204DFDB55DF58D8C0F26BBA5FB88B18F24C96DED0A4B246C33AD407CA61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3aae34a3b5d73812fb94a8a87f8002d7e30327a5f80ff921f17ba7492aa91065
                              • Instruction ID: b4d2c383ea9d081d5ca02ac7364e13a823c7c2b037eb05499d4b83aed1705f48
                              • Opcode Fuzzy Hash: 3aae34a3b5d73812fb94a8a87f8002d7e30327a5f80ff921f17ba7492aa91065
                              • Instruction Fuzzy Hash: A8213B343002158FCB19DB3AC454A6A73E6EF85616B2484BEE506CB3B1DF71EC42CB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f203bc7869ff8b1f7713578a0560d40b65c4e27d33c0dcd88fd0311178d75aba
                              • Instruction ID: b95579acb099cd1859e87b1d3d4d6392a4bf0cf792343153e3d4fee1842401c5
                              • Opcode Fuzzy Hash: f203bc7869ff8b1f7713578a0560d40b65c4e27d33c0dcd88fd0311178d75aba
                              • Instruction Fuzzy Hash: 8911AE32F006168BCB10EAAA88456BFF7B2FB84620F14853BD506A7340DA34990287C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b5ff9f5b31267211a8a249bad5bcfaedce9efebb014c795bb6b66c37e4136436
                              • Instruction ID: 82967d6cf1146a0c5194ac9061b28f77e1cd729020998f83718de19c8150f593
                              • Opcode Fuzzy Hash: b5ff9f5b31267211a8a249bad5bcfaedce9efebb014c795bb6b66c37e4136436
                              • Instruction Fuzzy Hash: AA31CEB0D012589BDB20DF9AC588BDEBBF5AB48314F24806AE409AB290C7B55845CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a1ecf5955c9a5459c3343918c83a3e8ee05c28005272364cbaed1f8a3a495e33
                              • Instruction ID: 1415c47f21c4025057e95686ac9c60e625eff2f6bd5600c4b95e1e65da213a02
                              • Opcode Fuzzy Hash: a1ecf5955c9a5459c3343918c83a3e8ee05c28005272364cbaed1f8a3a495e33
                              • Instruction Fuzzy Hash: B221EEB4C01218DFDB20CF99C589BDEBBF5AB08314F24806AE408BB390C7B55845CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5b0849d68a18a65a392c49efd6afe26233dbc2c4c712bf522d90cbfaec3b360f
                              • Instruction ID: c11e01a9524c04567e380e88b5e2e3005f80e929b98d3c20fc693da47e88a0fb
                              • Opcode Fuzzy Hash: 5b0849d68a18a65a392c49efd6afe26233dbc2c4c712bf522d90cbfaec3b360f
                              • Instruction Fuzzy Hash: 2111B275B042148FCB09EF29C4949EE7BF6EB89620F1581ABD106AB351CE75AC05CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 29dad588c8952f6501aa41f38de987424c089421fd584b866224916ba6d62f08
                              • Instruction ID: e39bcf9d1e478e56d9a782e9ec46bd5ab601d89f28fae4fa002540758ef7595a
                              • Opcode Fuzzy Hash: 29dad588c8952f6501aa41f38de987424c089421fd584b866224916ba6d62f08
                              • Instruction Fuzzy Hash: 6211C432F006154BDB21DBAA8C456FFF7B3EB84661F18847BC506E7340D67499018BC1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a9a7bcd1cf2f954a8a7a94fa47a1f153c4c3f201e467b7646deb8544110e46a2
                              • Instruction ID: e2c5c0f81466effb4d11e2b47f850d07d206d32723233fb089471b988170f577
                              • Opcode Fuzzy Hash: a9a7bcd1cf2f954a8a7a94fa47a1f153c4c3f201e467b7646deb8544110e46a2
                              • Instruction Fuzzy Hash: B211A376B006195B8B15DF798C486BFB7BBFBC82117154A29D815E3340DE3099018750
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537044016.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_135d000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3660043a6186101b52bddcfc827a02eb0019f94401f754ffc0f1cdab21345c03
                              • Instruction ID: eff27311ff7dcd09795a0692486a4cd6891d1ae4d6e960eb2b0fa10372e92eb3
                              • Opcode Fuzzy Hash: 3660043a6186101b52bddcfc827a02eb0019f94401f754ffc0f1cdab21345c03
                              • Instruction Fuzzy Hash: A521A175509380CFDB13CF64D990B15BF71EB45218F28C5EAD8498B2A7C33AD40ACB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8b89affa6467af88a7b92ad7ed5c9abcc1dcaef5e17297c2bd803ee2954e964a
                              • Instruction ID: d881c16f94f62d0dc8258084a099f9629a2accee0d49d7325bcfeca702388d9b
                              • Opcode Fuzzy Hash: 8b89affa6467af88a7b92ad7ed5c9abcc1dcaef5e17297c2bd803ee2954e964a
                              • Instruction Fuzzy Hash: DA11B175B006019FD711EB69C5489EB77F6EF84204B1489AAD10AEB390EB70EC098BA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8b46503be287e9893cd29b28b798e13200cd54a766618ae0837c3e5026888e44
                              • Instruction ID: 1aa9ee512d904bf1e5d36146648a3ddeab74a77e45cd012465b62c0cb9c15820
                              • Opcode Fuzzy Hash: 8b46503be287e9893cd29b28b798e13200cd54a766618ae0837c3e5026888e44
                              • Instruction Fuzzy Hash: 7D11E031B541058FD3119A2BD45975B77DBF788341F404C2EE186CB7C1CBB1B8418781
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9c9510e33278d9f37b4a588dae5e9fb0c4617b10472d7f03fadd3a84a4abeeaa
                              • Instruction ID: 2b9d0bb4202a1e7854df378259de606e17831a174016d30d49d0449527aee46b
                              • Opcode Fuzzy Hash: 9c9510e33278d9f37b4a588dae5e9fb0c4617b10472d7f03fadd3a84a4abeeaa
                              • Instruction Fuzzy Hash: CF217274A00705CFC755EB36C458AEAB7B6FF85315F00886ED05A1B260DF71A48ACB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c51381171b580a152f38167a5005e3205ed0b2f0a7a594a6d5a7455c9fb464c0
                              • Instruction ID: fbbda92686203c75f52676c2182037e7802dc16c235e93eb7a7df1b9d354f0c5
                              • Opcode Fuzzy Hash: c51381171b580a152f38167a5005e3205ed0b2f0a7a594a6d5a7455c9fb464c0
                              • Instruction Fuzzy Hash: 8111E0357545058FD3119A6AD44A79B77D7F788341F50483ED18ACB7D0CB71B4418B40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 86d3507bc6696e6e2a42769ffc192112c112c9e54528b9986c495655dcf7094b
                              • Instruction ID: fbe422c6fc41de34881e1010cdf5506aca4ce94ad80ea86495464eb7a942a625
                              • Opcode Fuzzy Hash: 86d3507bc6696e6e2a42769ffc192112c112c9e54528b9986c495655dcf7094b
                              • Instruction Fuzzy Hash: 3A21AF74A00705CFC755EB75C4586EAB7B7FF85302F1088AEC09A5B260DF35A88ACB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 27f2f1927215ce2aa5203ed2a4fb875b93e6de837b70f5acc789e68d04f58275
                              • Instruction ID: a81d7064b1970d0f5b1e08ccd712952227706766f4b5e1eed0ef4173074ca0d8
                              • Opcode Fuzzy Hash: 27f2f1927215ce2aa5203ed2a4fb875b93e6de837b70f5acc789e68d04f58275
                              • Instruction Fuzzy Hash: B511A5323042014BD7148B2DD8857A93BEAEF89611F1985B6E50ACF3A6DA24DC058750
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537044016.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_135d000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                              • Instruction ID: 7a9fb7f1a691c3271e2e7b42c260a16c382378db70d8541074227337e5c2f693
                              • Opcode Fuzzy Hash: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                              • Instruction Fuzzy Hash: 0C11BB75504280DFDB12CF54C5C0B15BBB1FB84628F24C6ADDC494B296C33AD44ACB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 333e515707b8953c53e03b332681d4f90baa177529dffd2dda5619c9aa2c6ff7
                              • Instruction ID: 712aa2b8bf5f7e2f65e780088ca84417ed8e676ebf0c6e73d4333459b32f726a
                              • Opcode Fuzzy Hash: 333e515707b8953c53e03b332681d4f90baa177529dffd2dda5619c9aa2c6ff7
                              • Instruction Fuzzy Hash: D911C43030031197D715AA6AD4157AA76C6EB98715F10CD2EE1898F3C2CEF6784687E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ae7d10f21bd57e3d64fb5f142fd2cfad07996489de64f49e0226b0b023f9f3ac
                              • Instruction ID: 545a78c362046b68be6715ea63516bf9e5ff45bd55efeb81aaab4d6840c80867
                              • Opcode Fuzzy Hash: ae7d10f21bd57e3d64fb5f142fd2cfad07996489de64f49e0226b0b023f9f3ac
                              • Instruction Fuzzy Hash: 4411D6703002159BE755AB6AD41579A7AD3EB98309F10C92EE1C98F3C3CEF6788587D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8231d4ceff86fe81d400c7eaa15ee4f2683c1841a6a25cdebb0e819f6ac23a6f
                              • Instruction ID: dc0f337ab308b663d9b04e8ec53c68f300d976eaa71f47112e4e1b491ad5c26f
                              • Opcode Fuzzy Hash: 8231d4ceff86fe81d400c7eaa15ee4f2683c1841a6a25cdebb0e819f6ac23a6f
                              • Instruction Fuzzy Hash: F81104B5C106488FCB10DF9AC844BDEFBF8EB88320F14851AD869A7310D774A545CFA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a422362a4d23b0dff27b6f82cea30641012c26468c8a42074d7d7cc163a7cea2
                              • Instruction ID: 9c8c543e2bb26f693f40200e8ef9772c36b437eb937aec84e5e114d49354acf8
                              • Opcode Fuzzy Hash: a422362a4d23b0dff27b6f82cea30641012c26468c8a42074d7d7cc163a7cea2
                              • Instruction Fuzzy Hash: 9A0142B2E00136A7CB04AF2DD4647DE7BEADF85208F1408ABD001AF380DEB45D0887E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d44c01023e3b648b71890085fb368bd6cc98f350c612d434f757b627ffd6761a
                              • Instruction ID: 6a3153c6d3a2e62479607faddd7a8ae2f8dd5d82b59fb5fdaba8a01beca5a70a
                              • Opcode Fuzzy Hash: d44c01023e3b648b71890085fb368bd6cc98f350c612d434f757b627ffd6761a
                              • Instruction Fuzzy Hash: 0E11E3B5C106488FDB10DF9AD444ADEFBF9EF88320F14841AD869A7310D7B8A545CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 825c942a7614c3518a1b9e1d995fbeff96bb5407a9ac127f4d1934bc95c58990
                              • Instruction ID: 7d2b2bb272b2876c5a19a7a46670237ca6aa6aa36783b8ad97c14b2d3e3316e7
                              • Opcode Fuzzy Hash: 825c942a7614c3518a1b9e1d995fbeff96bb5407a9ac127f4d1934bc95c58990
                              • Instruction Fuzzy Hash: 50012131B483580BCB08D7F999954FE7FEA8FC4221B1484AFE40EC7245E9348C418380
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4a7f8b3f98e49fc967f1613aba9c2ad0fedeec737daa9abb7785c87ad28846f8
                              • Instruction ID: c1376158f4945b080c126a37b70e0fd22f9145fee80d68eb44a81a4ba1ddd21c
                              • Opcode Fuzzy Hash: 4a7f8b3f98e49fc967f1613aba9c2ad0fedeec737daa9abb7785c87ad28846f8
                              • Instruction Fuzzy Hash: 2B11F5B5904648CFCB20DF9AC544BDEFBF8EB48320F14845AD919A7340C375A944CFA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 394ff7674c7a244a2bc9118cb3d5e164ac58659a1ba4e695e927a9de944396a7
                              • Instruction ID: 26b08ff1cf804af209caaf31a5c9018c5527dceda085c72fbac99db99458fae4
                              • Opcode Fuzzy Hash: 394ff7674c7a244a2bc9118cb3d5e164ac58659a1ba4e695e927a9de944396a7
                              • Instruction Fuzzy Hash: 3B11E3B59046488FCB20DF9AC544BDEBBF8EB48320F24845AD919A7340C375A944CBA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b39a35596de9a07a4ead321a31447295ea6acb54d9f05c93f0083d0223d2385e
                              • Instruction ID: 757e1f0845873609d55e1c8ac7bcea5738a2b2a426e63c3294d9cdbe3c1bf869
                              • Opcode Fuzzy Hash: b39a35596de9a07a4ead321a31447295ea6acb54d9f05c93f0083d0223d2385e
                              • Instruction Fuzzy Hash: A9111E71900208DFDF14CF5AC4487DABFF5FB88761F24C16AE828AB294C7748984CB98
                              Memory Dump Source
                              • Source File: 00000000.00000002.1536978346.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_134d000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: efc6872a37670ffe6df6e021f71e7dfca9578283639c54eb8da1232658e5b5df
                              • Instruction ID: cdf2415a8bb4220916b58c2ce50a396c3b2ecafeb8f5cd89e883fd109d72de96
                              • Opcode Fuzzy Hash: efc6872a37670ffe6df6e021f71e7dfca9578283639c54eb8da1232658e5b5df
                              • Instruction Fuzzy Hash: 5501F7710043849BE710CEAACDC0766BFECDF55338F18C81AED094E282D238A840CA71
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c0a9c4877fb29fe098dc333c9f853938abd86cd08312971c751ac40228c07633
                              • Instruction ID: 59dbcd7c31b0cb5fbbc56870681b3d050aaa503130f7c219c486f3d8305dc5de
                              • Opcode Fuzzy Hash: c0a9c4877fb29fe098dc333c9f853938abd86cd08312971c751ac40228c07633
                              • Instruction Fuzzy Hash: 5EF0C83031071407D6196726D469BEF3296BB98B1AF00456EE8069B3D1CFF6ED4283D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d074a4e336398e83798c968fe3985d3fc0b1589faea71eccdc243fa51a6c5683
                              • Instruction ID: 240cbd77d919b40dec7d31326695da4c8e501ca2a9fa5cbee3ba7d70f9305e4f
                              • Opcode Fuzzy Hash: d074a4e336398e83798c968fe3985d3fc0b1589faea71eccdc243fa51a6c5683
                              • Instruction Fuzzy Hash: 3F1103B5800648CFCB10DFA9C585BDEBBF8EB48320F24845AD969A7340C379A545CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4e67cf73927864979b085d64caea727dbf45ba260261ae8f0a85ff8659bf3dde
                              • Instruction ID: 7771bfcf2129144c59dc43cf296a15c06caade5c47cf8dfd718232961225a978
                              • Opcode Fuzzy Hash: 4e67cf73927864979b085d64caea727dbf45ba260261ae8f0a85ff8659bf3dde
                              • Instruction Fuzzy Hash: B901D671B002545BCF06A7699C589FEBB7ADF85210F10006ED61DEB380DA750E01C3A5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fd678997ceb6c789b8e41bb7d2cd87fc4cede9e5886d812ec80f9a7cd11f6121
                              • Instruction ID: e538cac18b84aa0da9eb2c0308192b2e5dc7321087c1f33428a55aaa0376b6c6
                              • Opcode Fuzzy Hash: fd678997ceb6c789b8e41bb7d2cd87fc4cede9e5886d812ec80f9a7cd11f6121
                              • Instruction Fuzzy Hash: 94010C71A00708DFD728EF3AC4545AAB7B6BF85301B50C56FD8468B360EB71E985CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e71faff4db3a613f541ac56fbc5c247c33c7fb0cb744bf1131f35003255ce77b
                              • Instruction ID: 14fa295526929a6d79dfb8c5a289f3006b241c750765543acea6d8fa2065e1a4
                              • Opcode Fuzzy Hash: e71faff4db3a613f541ac56fbc5c247c33c7fb0cb744bf1131f35003255ce77b
                              • Instruction Fuzzy Hash: BB017130A057489FD729EF79C4146967BB6BF85301F40856FDC464B361EB70E985CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8e0c0a527b54ee9bdfc844f5e6c538fe33cdf144bff4aaae532b1bb98435b60a
                              • Instruction ID: d5271d8b488bdf0933a7bd3920a00ed5eb585f59278195e64183f84fab5d7773
                              • Opcode Fuzzy Hash: 8e0c0a527b54ee9bdfc844f5e6c538fe33cdf144bff4aaae532b1bb98435b60a
                              • Instruction Fuzzy Hash: AEF0FC303106149BC719A7365C187BD77AA9FC4916F04406FDC058B391CF21C882C3D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: abdca530b33e1bf79b356441e4094e9ef4d8e54bf25b1647c8bf59650d565261
                              • Instruction ID: f659d21238201b35bf7b3fd29cc5192fd1f9965b2f4b483fc3438e7b519a3577
                              • Opcode Fuzzy Hash: abdca530b33e1bf79b356441e4094e9ef4d8e54bf25b1647c8bf59650d565261
                              • Instruction Fuzzy Hash: E401D771900208DFDF14CF9AC4487DABFF5BB88761F24C16AE828AB294C7748984CB94
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e89c882975dd7c5018f0f8924989c324a10698f577fb245773c606928b8a26fe
                              • Instruction ID: b6973fd1f9e841cb018bf59606d9b8c9e2263ba163de8e1f326be2f5203bd5b4
                              • Opcode Fuzzy Hash: e89c882975dd7c5018f0f8924989c324a10698f577fb245773c606928b8a26fe
                              • Instruction Fuzzy Hash: 4201FD30B047088AC702AB7898046FEBBB9AFC5211F00426ED84657201DF30A545C781
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4f17a5a83b3dd495f7c3bbceecbf682cfdf889a2d5c48253b8f1b7663bdacf94
                              • Instruction ID: 62a718a7fc9ef6abd6e3a52a27cc06cc82ab5218c93c99788f0095857dca05b7
                              • Opcode Fuzzy Hash: 4f17a5a83b3dd495f7c3bbceecbf682cfdf889a2d5c48253b8f1b7663bdacf94
                              • Instruction Fuzzy Hash: A3F0B4313486128BCA2C9E3BD444BBB32DEAF85A53B054D6FE807C7650DE20D8528692
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 56c49abcdfc6bc1fc8a1d1e33d8b24d1f8a4a920382d488b5a36c76aac04dc39
                              • Instruction ID: 7a971c608f5443ed4576823c4c47fac863df67f7d24424c150f37e980d970006
                              • Opcode Fuzzy Hash: 56c49abcdfc6bc1fc8a1d1e33d8b24d1f8a4a920382d488b5a36c76aac04dc39
                              • Instruction Fuzzy Hash: 7D0181343501008FCB109B6DD45CABA37EAEFCE655F1840BAE50ACB331DE219C42CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d4d8097cb6305958bc575a25875a11233647f5484f868be0919dee7c45e7f843
                              • Instruction ID: 0c7f0e30a44b5fb6cf5a8496321982eb98687ab825c562a663e220113f8e3eba
                              • Opcode Fuzzy Hash: d4d8097cb6305958bc575a25875a11233647f5484f868be0919dee7c45e7f843
                              • Instruction Fuzzy Hash: 1BF09671B001145B8F15B7A95C589FEFABADFC9611B10002ED51DAB340CE720E01C7E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: de98308abcfbb36c89aa645ea6e3592a5a883d95819862c10d1a8a9cda427e2b
                              • Instruction ID: 2d1e7b991bc5da634171d1cb6bfa6e29c8591119fe2f6432b626172f7c2d46fe
                              • Opcode Fuzzy Hash: de98308abcfbb36c89aa645ea6e3592a5a883d95819862c10d1a8a9cda427e2b
                              • Instruction Fuzzy Hash: 26F024313096128BCA2C9E66D444FBA36EDAF81A42F09499FE803C7390CB20CC52CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f319d5efaf2f3ad3cd58f385ca17225282e16c66c759ab0773bf42873caf00be
                              • Instruction ID: a1c75c7fe07e4a137bb67541427092ac95575b8ee3dc6fb4f75098a2099e30c2
                              • Opcode Fuzzy Hash: f319d5efaf2f3ad3cd58f385ca17225282e16c66c759ab0773bf42873caf00be
                              • Instruction Fuzzy Hash: 74F0FC313007049FC3259B2BD454A2AB7BAFFC9225F10059EE80A473A1DF35AC42CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5292f1a2bc326368b5df3ceed610734ff2d902751e78863e3fccd98aed040a5e
                              • Instruction ID: 00cc1a81103c291683ec29a2263c9e0cc06cee854956d254d2e96d0e88e9c6f7
                              • Opcode Fuzzy Hash: 5292f1a2bc326368b5df3ceed610734ff2d902751e78863e3fccd98aed040a5e
                              • Instruction Fuzzy Hash: E3F090303107204BD6196B369418BEF329A7F98B1AF00056EE8068B3D5CFB6EC4243D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eeb70690606d21cdf3baabc76bb13eaa94d41e41054573cf52f8c11af1bc5540
                              • Instruction ID: b6d29d5b81354d4e8bf267e2adbdb6de6b731c436cf41911d94a161d0e0a20d6
                              • Opcode Fuzzy Hash: eeb70690606d21cdf3baabc76bb13eaa94d41e41054573cf52f8c11af1bc5540
                              • Instruction Fuzzy Hash: 49F06230A0415997C718AB7984546EE76BBEF85700F60486FD5026B384CEF55D054BE5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be98a6c32f2291b4e885849316cab958f7b5a29e31b393b3a07a7a3853091b2b
                              • Instruction ID: 11b06e6e7a606d266198ceabee2bd74072fb9cde4cd5dd9ee6b27f71b6571d09
                              • Opcode Fuzzy Hash: be98a6c32f2291b4e885849316cab958f7b5a29e31b393b3a07a7a3853091b2b
                              • Instruction Fuzzy Hash: 59F0C231B007049FCB157A75C8184FEB77AEFC5611F01466ED8465B300EF30A545C6D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1536978346.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_134d000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ea61d3020e90d1303fd35b65935357b9dab0361b91b1093c91c35e335285efd7
                              • Instruction ID: 7a2d7a9cc5f26c300e5b4db5bb530eb6780a32bfe449302025acecd184378b6f
                              • Opcode Fuzzy Hash: ea61d3020e90d1303fd35b65935357b9dab0361b91b1093c91c35e335285efd7
                              • Instruction Fuzzy Hash: EBF06272404384ABE711CE1AD984B66FFD8EB91738F18C55AED484F286C279A844CA71
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 27958637cff55890139de4c34c163e1aeaee72aa1fd90dcf7cf96695afa8f820
                              • Instruction ID: ef6fc622a75bf2b949b5cd54d20eb60d4230a6d613f66366d16501b270f88263
                              • Opcode Fuzzy Hash: 27958637cff55890139de4c34c163e1aeaee72aa1fd90dcf7cf96695afa8f820
                              • Instruction Fuzzy Hash: 16F05E353005149B8B19A73A98186AEB6AAAFC8927718407FE8068B390DE25C882C7D5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 74439e6b7ccee6f170ed7b3dfc01e6e531a3e4d8dca324c61b240dadcd4a3f2b
                              • Instruction ID: 1a0daf2bbdc72124343f474f9f17aa0c5e4b796dfc76c27dd2440be840ac0b7c
                              • Opcode Fuzzy Hash: 74439e6b7ccee6f170ed7b3dfc01e6e531a3e4d8dca324c61b240dadcd4a3f2b
                              • Instruction Fuzzy Hash: DAF05B313006149FC6259B1BD45496BB7BAFFD8625B10055EE50647364DF31AC42C750
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e26b3b693c3fa3a092213b46d9974f97095fdf38ae2968b16eb170a88f8efb51
                              • Instruction ID: 4243ceffdd30f352615e2fe6667d750750fc4abca0ae9b7f9b7c733986b7bd1f
                              • Opcode Fuzzy Hash: e26b3b693c3fa3a092213b46d9974f97095fdf38ae2968b16eb170a88f8efb51
                              • Instruction Fuzzy Hash: 0601B675D00609DFCB40EFACC54589DBBF4FF49210B1185AAE859EB321E770AA44CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4f4a8d077f76bbf01242de4728246fff0afe642b4f5d1941e1f69a383e384fe4
                              • Instruction ID: 3419dd53d4681314123e736432f213d107082da2e9dbf48f101aeca11cf7c7e9
                              • Opcode Fuzzy Hash: 4f4a8d077f76bbf01242de4728246fff0afe642b4f5d1941e1f69a383e384fe4
                              • Instruction Fuzzy Hash: F3F058716103458FEF18CF29D482AA577E6FB08309B30099EE41ACF302D762E8038B84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 036c4b77975b17adefeeafd7e2dcf978c5a83d72af1c9d0d71f08201860b80e1
                              • Instruction ID: dd1dc8910aa14ddbeeddea774788281ac3d0194dcb2677678992ac78faab26e2
                              • Opcode Fuzzy Hash: 036c4b77975b17adefeeafd7e2dcf978c5a83d72af1c9d0d71f08201860b80e1
                              • Instruction Fuzzy Hash: FD01B675D00609DFCB40EFA8C64599DBBF0FF48210B11859AE419E7321E7709A54CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5c6ac0527d4bdaf11cf2d99c3f51a9e5ca02ed05c6b6066476c76388c96ee375
                              • Instruction ID: 12b6e02e9bc1e5d520287cca2df6b09c8e5d2f0ac0b1252a88ee713927936259
                              • Opcode Fuzzy Hash: 5c6ac0527d4bdaf11cf2d99c3f51a9e5ca02ed05c6b6066476c76388c96ee375
                              • Instruction Fuzzy Hash: 6AF0A03064E34ADFC3269B7A84548663BE5EF5A21131488BFE0598B362C631EC86CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 13383f82c599c22f13e3938378b6cb0d51cc8f1de1f3836442f9445c53826bd3
                              • Instruction ID: 03dd5f1093f80fd2c7544387efa4ac9441c7d7a72bd63b18cae2eae8ee371d52
                              • Opcode Fuzzy Hash: 13383f82c599c22f13e3938378b6cb0d51cc8f1de1f3836442f9445c53826bd3
                              • Instruction Fuzzy Hash: 50E09271B006211B871CFBAFA40086AF6EBEFE8510308C57FD50E8B768ED31AC0246C4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 88337b5f8b2d3c1069a0ec687d1841a01f05636be53e1f29a8eae9fd7b1bbb38
                              • Instruction ID: 72b98912b6069fca17c8758b3adaf6571f9ff93c08fc23cbab4e09e9232b4ba2
                              • Opcode Fuzzy Hash: 88337b5f8b2d3c1069a0ec687d1841a01f05636be53e1f29a8eae9fd7b1bbb38
                              • Instruction Fuzzy Hash: A8E0487171530447C724A77B54587E7779BDF46256B50087FE54EC7348DA32D800C695
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8695090006937a1504605dabd0cdbfc605977a03f17a0ce370d1777160248966
                              • Instruction ID: 54236c491f23c817f6d1be6ba449e1189ff076caa6d3a3f388f554c66be00630
                              • Opcode Fuzzy Hash: 8695090006937a1504605dabd0cdbfc605977a03f17a0ce370d1777160248966
                              • Instruction Fuzzy Hash: 78E06D316142558BCB58CF58E4566A57BD2FB04309F24096AE446CF601D761D8428784
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ce03ca65c8aefb6ff931410dbc0d9c3f757a1056b99e92131af22455e186406c
                              • Instruction ID: a9363a273d75b3a3dc21e44d88a5d25490eabd4ce109cdaeeba71dad5dee4552
                              • Opcode Fuzzy Hash: ce03ca65c8aefb6ff931410dbc0d9c3f757a1056b99e92131af22455e186406c
                              • Instruction Fuzzy Hash: E0E0DF307083185BC30A2B1994217DA7AEA8F8A240F0984ABE948CF393C5B09C0443AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 676f9cdf9b6f05558e99cb45ee5b54e973a30828ab28d870034e3e25130794ae
                              • Instruction ID: 3e88bdeb67ea7a1d92156655b0bf7e7c64f4ba3e4b0e97c85ae0d34fb4257c12
                              • Opcode Fuzzy Hash: 676f9cdf9b6f05558e99cb45ee5b54e973a30828ab28d870034e3e25130794ae
                              • Instruction Fuzzy Hash: DFE04F302557149FC318DB6CF844F667BEEAF89611B2446AAFC45CB261DB60EC458790
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f55a5411b7c41da5b7155fb649138f40bd3a889bb2a1c99e533a0f8c627fabb7
                              • Instruction ID: 2fe3c8923da3ded6a48adb45eeb15bbdbb15dd822dcbed0cf7ffb0d03bf932ed
                              • Opcode Fuzzy Hash: f55a5411b7c41da5b7155fb649138f40bd3a889bb2a1c99e533a0f8c627fabb7
                              • Instruction Fuzzy Hash: C3E0DF71A8010DDBCF14AB90E1047FEBB71FB45B57F201413E102B2640C7300584CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eedb99510a908d33aa72b4eb59226a5a7a3cb2772b635d4a1a871a0fdb5eaf4f
                              • Instruction ID: 3f808b31e4e9275a061a7f806fdd6cc600033fa12507e9d1ca69a575fcad6f11
                              • Opcode Fuzzy Hash: eedb99510a908d33aa72b4eb59226a5a7a3cb2772b635d4a1a871a0fdb5eaf4f
                              • Instruction Fuzzy Hash: 2FE0487070534447C7299B7791187E67FEA5F47156F1404FED98987346CB319840C791
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c0bc48003f6b2e4294483c6ca673dfcf33d19a5283b9b658bc6876299d791db3
                              • Instruction ID: 7732b609d0a3774cf0fc4d6800fe573cdb2950c339b4e0d012085cfbcaed1c61
                              • Opcode Fuzzy Hash: c0bc48003f6b2e4294483c6ca673dfcf33d19a5283b9b658bc6876299d791db3
                              • Instruction Fuzzy Hash: 4EE0DF31A01318CBC3299B66D440A9273A5EB51261B0081BFD9098B360C636E881CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ee86c35ddb61e877d682ad647843499d91fdcbe4c6bfb970aa5b934d67f3a77f
                              • Instruction ID: 95af2b54b0df8fe9d1ac6d3d4dec89282157c110e138049783c463f054536096
                              • Opcode Fuzzy Hash: ee86c35ddb61e877d682ad647843499d91fdcbe4c6bfb970aa5b934d67f3a77f
                              • Instruction Fuzzy Hash: 17E0C2303147049FC328DA1DE8808AAB3EEEF8D3113608EAAF00ACF320DA60FC454785
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eaedba930885675faa74d318a056328e327c76745ec50c2c15e94eb19dfbf58d
                              • Instruction ID: d11db3748d52ea6bc06490c0752cd6bb365f032ca838a5c1fef722f55b90d5e6
                              • Opcode Fuzzy Hash: eaedba930885675faa74d318a056328e327c76745ec50c2c15e94eb19dfbf58d
                              • Instruction Fuzzy Hash: 74E02635B4D3E05BC212F3769850BEF37A9D780262F40167BDA048B388DA646C8583F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2024ab516423d5ddb8871d37b613ba36889343a76e05cc1c38f4a40115d7b481
                              • Instruction ID: fa9932daa8e8b9de1dfeeb04306758181120cf9a52c97536c64c5b70f84e456f
                              • Opcode Fuzzy Hash: 2024ab516423d5ddb8871d37b613ba36889343a76e05cc1c38f4a40115d7b481
                              • Instruction Fuzzy Hash: 56E08670A007151FD714EBBB9400BB777EAEFE8600B08C57FD94987759DA3169424BC4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 28f43d5763c678bdf9e2ba96edc1f9cad7044cab36a94268132a64880545fa9f
                              • Instruction ID: 9ee3d05ed990dd6cb084f142ba4a828287adfb4735d36a6bf9041d98f283e43b
                              • Opcode Fuzzy Hash: 28f43d5763c678bdf9e2ba96edc1f9cad7044cab36a94268132a64880545fa9f
                              • Instruction Fuzzy Hash: 53E06D31A04249DFCB41EFE0DA412DD3BB1FB49614B60869AD80EAB286DA326E05DB10
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 98c77892b3d8e254c88f009788d3bbe1206059811cf4bb0f22894274d7673ae8
                              • Instruction ID: b0f43aa45edf5b3e54738df4c7d906c32f50ac54b71a6b54ced4f0d5d262b76c
                              • Opcode Fuzzy Hash: 98c77892b3d8e254c88f009788d3bbe1206059811cf4bb0f22894274d7673ae8
                              • Instruction Fuzzy Hash: A8D0A7323042244BCF1836BA74094AD378DAA44766700047FF40FC2700DE61880043C5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a63a41cff6db319224cbd8adef9382d892354f5705d2002de4550735a5303d84
                              • Instruction ID: fa388d4c32cc625966fcd09817a4e8eb381d88b97c8987a2071bf5d75cb84907
                              • Opcode Fuzzy Hash: a63a41cff6db319224cbd8adef9382d892354f5705d2002de4550735a5303d84
                              • Instruction Fuzzy Hash: 77D0123F9405099ACB01DA94F905BD9BBA5FB94212F8044B7D144D7110E222E5289791
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 605ff28c3b2699f1f639a13cb9efe887ee210a90874c2a1a4e40499e7a72006a
                              • Instruction ID: 85b6f5ebed205336224a5f6d282e7c4d1449656c01fdc2cd1ea4d4ca4bee875a
                              • Opcode Fuzzy Hash: 605ff28c3b2699f1f639a13cb9efe887ee210a90874c2a1a4e40499e7a72006a
                              • Instruction Fuzzy Hash: D5D02B37300118AFDB044B68D805BD97BE8DB0E320F048032F609C7310DF21DC018680
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ca3ff1c7ceb69ee537a8e1d0bdc28aa55ff641e937eb3317a7c022b95dfb62d6
                              • Instruction ID: a1b4d8031aa7dee1c9bbb0d622a489a2c4833ccfbdba967b95f1d1bf5a91cbed
                              • Opcode Fuzzy Hash: ca3ff1c7ceb69ee537a8e1d0bdc28aa55ff641e937eb3317a7c022b95dfb62d6
                              • Instruction Fuzzy Hash: 6CE08630A0020DEFC700EFA5E94055C7BF5FB48614B20469AE80AD7305DB336E009B51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4704ea73bafcc3a8a55bf7868144b69a456ff5133fc90410e76be54f2ce8ab9f
                              • Instruction ID: cb8ffdc993a3ca7da859c0cc4d411db728867ed875d60f4203a9af536b969a83
                              • Opcode Fuzzy Hash: 4704ea73bafcc3a8a55bf7868144b69a456ff5133fc90410e76be54f2ce8ab9f
                              • Instruction Fuzzy Hash: 85E09236A4110DABDF01DF80E955BEEBB73FB88316F208016EA1566290C7725A62DB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e01189da238703285bc3c08159610192bc4b8af68b5ad447e9d56b0985b22422
                              • Instruction ID: 30d4a95f55020904c9ef08be406185d73b4e78d84ba7106279a2ab2388d60e8b
                              • Opcode Fuzzy Hash: e01189da238703285bc3c08159610192bc4b8af68b5ad447e9d56b0985b22422
                              • Instruction Fuzzy Hash: 5ED05E317046240BC70A6A4A90107DAB6DA8FCD651F04847FE5098F392C9B1AC0002E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8565b4478b21f316b85ab7a1a45cfeba2288e61544ab65e4ac1f4e88cf79c7bd
                              • Instruction ID: e1de3dce6914dede6b6d856261c3b87eebd778f8c100917119d1b3e1ddee26df
                              • Opcode Fuzzy Hash: 8565b4478b21f316b85ab7a1a45cfeba2288e61544ab65e4ac1f4e88cf79c7bd
                              • Instruction Fuzzy Hash: A7D0223221D3A823C70821BD78027E67FCCAB82721F0808BAFC8CC1243E951881043D6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ee2d5198dbcb1662100b7f394e4d842837268f1d7e6037a0f055db6a8bf96171
                              • Instruction ID: 2b5e9894acabb5bb4ae4dbd4c13c443132c8ff95099e46f0945b561194632d7d
                              • Opcode Fuzzy Hash: ee2d5198dbcb1662100b7f394e4d842837268f1d7e6037a0f055db6a8bf96171
                              • Instruction Fuzzy Hash: 11E0E231140248AFCB01CF95EC08E9A3FA9AF49620F058195FE484B232C332D925EBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: aedfb4dd1f4b0dc7fe8b573cac18e4df551521c592225e73a090754fe45e49fd
                              • Instruction ID: d43f44a6de6a0dcb59bdbf2c9b8aa50bbe58cbf97d3e4a0f2156d7a1a7dfc57a
                              • Opcode Fuzzy Hash: aedfb4dd1f4b0dc7fe8b573cac18e4df551521c592225e73a090754fe45e49fd
                              • Instruction Fuzzy Hash: 3BD0C93A3101289F87049B69E418CA97BE9EB4D6613158066F909CB321DF72DC118BD4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d7d9c4e8f9bfdbcea7bdcd57a69edf88c7ee2c5cbb2d4dd7a5463c0ce0604d0c
                              • Instruction ID: 9ef42550910b343cdfd842b437886c3de28221caca7ee07b20f87815eafa43b9
                              • Opcode Fuzzy Hash: d7d9c4e8f9bfdbcea7bdcd57a69edf88c7ee2c5cbb2d4dd7a5463c0ce0604d0c
                              • Instruction Fuzzy Hash: 20B09B2135423513D50431DD65115EE728E47C9561F00006B950E877454CD55D4102D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c63055a45eeb4ae8ae8d6e3381b45a0748b663f32349da8a3f0a884f24e2bbca
                              • Instruction ID: 103967bf13f508402a192ef6221732069224ae084a114efb1bafc53f37aadea3
                              • Opcode Fuzzy Hash: c63055a45eeb4ae8ae8d6e3381b45a0748b663f32349da8a3f0a884f24e2bbca
                              • Instruction Fuzzy Hash: BCD0C93614010CEFCB01CF95D844D9A3BBAFF48720F008054FA084B232C332E821EB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0398266480ff07ac38c06bd400e3949287cd50e5cf48d2cee9459bbb947b62de
                              • Instruction ID: 17c88bf62ad7f2e1fe57d2207998777d10fb67c10a2c12b5b3aedbe220fab676
                              • Opcode Fuzzy Hash: 0398266480ff07ac38c06bd400e3949287cd50e5cf48d2cee9459bbb947b62de
                              • Instruction Fuzzy Hash: C3C09B3E254004AF8703EF55D598C597BA5FF95301B80DD9761844B130D632D418E713
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f3a87a49faac537a4ab15ba784faa41584196d0441c94ad7082160fcb17c927c
                              • Instruction ID: a4e7f5584e79e97a4303538bd5d63515f91b9c028ceaf882e43642814a3902f3
                              • Opcode Fuzzy Hash: f3a87a49faac537a4ab15ba784faa41584196d0441c94ad7082160fcb17c927c
                              • Instruction Fuzzy Hash: 18B0118822800282AE00FA3B0CC88BA002BAFC0B023C8CE0A20002800AAC2AA002200A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c13c9b8866bed55cc72e85cbbd34dfbdf24eaffed40b7b0cb06727a7df7049a9
                              • Instruction ID: 41dbc7e51bfae4765553e3c2966fcb8f5ca4aa326ea4e1ee5ec0cf36ffe9cfe3
                              • Opcode Fuzzy Hash: c13c9b8866bed55cc72e85cbbd34dfbdf24eaffed40b7b0cb06727a7df7049a9
                              • Instruction Fuzzy Hash: B9B0924C10E3CA16EB06E7B23C44B552EA63FC2405F8CC68E9CD0440938F6D4019A311
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8fc304a26ba6a9b8e09db51e88682a954301326f375d2764bec1dfa900b44145
                              • Instruction ID: 341c974fc7b1033c4da319754ba1f52ac03f13633d70df7942d534c42cff5abb
                              • Opcode Fuzzy Hash: 8fc304a26ba6a9b8e09db51e88682a954301326f375d2764bec1dfa900b44145
                              • Instruction Fuzzy Hash: FAB09237A0400889DB108A84B4423EEF720E780226F104023C212520418372016596D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4c277b559a7bf2dd9ea2c5729d11915119e5d5f056676045f1fc5dd42388c60d
                              • Instruction ID: c3c82a615ca0b65e9734123abdf92be53a5eb713042dd704342046625b0102ac
                              • Opcode Fuzzy Hash: 4c277b559a7bf2dd9ea2c5729d11915119e5d5f056676045f1fc5dd42388c60d
                              • Instruction Fuzzy Hash: 64D18EB17017059FEB2ADB76C450BAE77F7AF89600F24846ED14ACB2A0DB35D901CB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.1542998002.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54b0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 82ad6ffd88ab3d2acfc76312510395d38e3de05953834611370492baa02c5b18
                              • Instruction ID: 4cafbd30e8c7df67d30996f73704b944f3b60a35c328ee49866afe3572722a47
                              • Opcode Fuzzy Hash: 82ad6ffd88ab3d2acfc76312510395d38e3de05953834611370492baa02c5b18
                              • Instruction Fuzzy Hash: F21276B0EC1745CAD710CF66E94C18B3BA1BB46398BD04B09D2A16B2E5DBB415EACF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 111c32eb54072b46ba631e7e11c204a6b44eefec21dbada703307ba2678d5df3
                              • Instruction ID: 8b12b1b1c62ba35472d4733a8611c159c9ba32c7c40171338bb1163f38807977
                              • Opcode Fuzzy Hash: 111c32eb54072b46ba631e7e11c204a6b44eefec21dbada703307ba2678d5df3
                              • Instruction Fuzzy Hash: EBE11CB4E101198FDB14DF99C5809AEFBB2FF89304F24816AD419AB356D731AD41CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 55b12479f1e9bd2b7c66a173c9e34fd8ba6c6d396c2617aacfd0034ff418ef88
                              • Instruction ID: eb1bd63cdca916e1f8ba54a40a681595df225fc37ace6758f3c2c5d910fc571b
                              • Opcode Fuzzy Hash: 55b12479f1e9bd2b7c66a173c9e34fd8ba6c6d396c2617aacfd0034ff418ef88
                              • Instruction Fuzzy Hash: FFD1F83192075A8ADB11EFA5D994699B7B1FF95300F10879BE40A3B225FF706AC4CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c53112054bfed8f26340cbf7d3ed429fd9e1a7e9f49908cada2e4d0429e0e94e
                              • Instruction ID: b2c576e509fcfcf8d585acd9d2c002ccb7ff656242256ca1459c559ae2982125
                              • Opcode Fuzzy Hash: c53112054bfed8f26340cbf7d3ed429fd9e1a7e9f49908cada2e4d0429e0e94e
                              • Instruction Fuzzy Hash: A7D1F83192075A8ACB11EBA5D994699B7B1FF95300F10C79BE40A3B215FF706AC4CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.1537267664.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1400000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1c872503c196646fcb08d567411c9680dd47e7d917b9c791182cd96f7b528882
                              • Instruction ID: 6428005e1ad2383360695835cc734c2b50962565c5cb91e4817207c79cb2c22f
                              • Opcode Fuzzy Hash: 1c872503c196646fcb08d567411c9680dd47e7d917b9c791182cd96f7b528882
                              • Instruction Fuzzy Hash: 19A16132E10216CFCF16DFB6C44459EBBB2BF94300B15857EE905BB2A1DB719959CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1542998002.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54b0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ba14f6460b88a50586931bad1878734ae634f9343b98e0e7175d4e87ab56bc31
                              • Instruction ID: 6c0fd35c35245d790746b02dcb2b9d0fdac0e0f9c0407c8c4ec1999497192255
                              • Opcode Fuzzy Hash: ba14f6460b88a50586931bad1878734ae634f9343b98e0e7175d4e87ab56bc31
                              • Instruction Fuzzy Hash: D1C1D8B1EC17458AD710CF66E94C18B7BB2BB863A4FD04B09D1616B2E4DBB414EACF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f4a109dd477c6eaf4631e0ff69ef8ed8ee84c523a615749fdeb6a14988223844
                              • Instruction ID: fc3ba000e454c17b433c4c924af33ddf87b25394693c08573dbb470496f98309
                              • Opcode Fuzzy Hash: f4a109dd477c6eaf4631e0ff69ef8ed8ee84c523a615749fdeb6a14988223844
                              • Instruction Fuzzy Hash: F4712671D01218DFCB14DFA9D8886EDBBB6FF49306F20856AE405BB291D7359A45CF10
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cccd269c65c30211fb8dca66f8076f5e9f16fc2ac224e83bdc498f2b18d5b25f
                              • Instruction ID: 08d33adc92cab7236d522c68bc8ab5460c4b6b0aa155c3faa599dd198a86b2f7
                              • Opcode Fuzzy Hash: cccd269c65c30211fb8dca66f8076f5e9f16fc2ac224e83bdc498f2b18d5b25f
                              • Instruction Fuzzy Hash: 3B617FB4D142598FDB15CF69C9805AEFBF2FF89304F2481AAD408AB256D7309D42CF61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1544866735.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7330000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2ce68d684a14b9498642c184d37b83f717287084ae05e23c1a037bd5fd912b3d
                              • Instruction ID: 4067b8f6b8ebdcd8e9b4e084ff6feee20530ab610999d64fdf92cfe2987aa5ad
                              • Opcode Fuzzy Hash: 2ce68d684a14b9498642c184d37b83f717287084ae05e23c1a037bd5fd912b3d
                              • Instruction Fuzzy Hash: B6C04CE6AAD148D6D5201E84B0090F8B73CD78B1F7F413151D91EB3841862557754644
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq
                              • API String ID: 0-3018063872
                              • Opcode ID: 5ee0f4586c6427f1a7d37446e9743a973b9743437dc179c36f28e1b3b2236164
                              • Instruction ID: 63f355f3d91bf755d1dc019e2730fde97f435e0ca3c92a81aac9677c99d4dd88
                              • Opcode Fuzzy Hash: 5ee0f4586c6427f1a7d37446e9743a973b9743437dc179c36f28e1b3b2236164
                              • Instruction Fuzzy Hash: 08125070E4021A8FCB58EF77E95069E77B6FF54300F504A6AC00AAB2A5DB342D95CF91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq$4'gq
                              • API String ID: 0-3018063872
                              • Opcode ID: 758d0008de73746d015cb86b408b6ede48356caae183f6b1d5e2d43715320d08
                              • Instruction ID: daa84b4bfce68379131a6f6b579d11a1066d7ca9e389acf54bad8d1438669e6f
                              • Opcode Fuzzy Hash: 758d0008de73746d015cb86b408b6ede48356caae183f6b1d5e2d43715320d08
                              • Instruction Fuzzy Hash: 57125070E4021A8FCB58EF77E95069E77B6FF54300F504A6AC00AAB2A5DB342D95CF91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'gq$4'gq$4'gq$4'gq$4'gq$4'gq
                              • API String ID: 0-2333435085
                              • Opcode ID: ebec2e380f79de24185badd42372bdd7771ffac4e18768edb70b1a516c9b4d96
                              • Instruction ID: dc951ed950a76fd088c7646a5bb718132e1b733170925f4cffd861beba50583f
                              • Opcode Fuzzy Hash: ebec2e380f79de24185badd42372bdd7771ffac4e18768edb70b1a516c9b4d96
                              • Instruction Fuzzy Hash: 3441F370E81206CFD708EF77E95566F77B7FB44240BD0496AC4459B2A4EB3029A1CF91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1543168737.00000000054E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_54e0000_Quote.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4'gq$4'gq$4'gq$4'gq$4'gq$4'gq
                              • API String ID: 0-2333435085
                              • Opcode ID: de4be9f5ffa95919fa25109f2e1755a095be72789f7db7a54947c641d4ce3ca2
                              • Instruction ID: 64d9c0f20dd010f74f119658de9f472710bd3a37ba4095c5d20b8b9b9e704df5
                              • Opcode Fuzzy Hash: de4be9f5ffa95919fa25109f2e1755a095be72789f7db7a54947c641d4ce3ca2
                              • Instruction Fuzzy Hash: 4B41DE70E812068FD708EF7BE95556F77B7FB44240BD0496AC446AB2A4EB3029A1CF91

                              Execution Graph

                              Execution Coverage:7.1%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:11
                              Total number of Limit Nodes:2
                              execution_graph 15700 2b3d700 DuplicateHandle 15701 2b3d796 15700->15701 15702 2b3d4b8 15703 2b3d4fe GetCurrentProcess 15702->15703 15705 2b3d550 GetCurrentThread 15703->15705 15706 2b3d549 15703->15706 15707 2b3d586 15705->15707 15708 2b3d58d GetCurrentProcess 15705->15708 15706->15705 15707->15708 15709 2b3d5c3 15708->15709 15710 2b3d5eb GetCurrentThreadId 15709->15710 15711 2b3d61c 15710->15711

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 294 2b3d4a9-2b3d547 GetCurrentProcess 299 2b3d550-2b3d584 GetCurrentThread 294->299 300 2b3d549-2b3d54f 294->300 301 2b3d586-2b3d58c 299->301 302 2b3d58d-2b3d5c1 GetCurrentProcess 299->302 300->299 301->302 303 2b3d5c3-2b3d5c9 302->303 304 2b3d5ca-2b3d5e5 call 2b3d688 302->304 303->304 308 2b3d5eb-2b3d61a GetCurrentThreadId 304->308 309 2b3d623-2b3d685 308->309 310 2b3d61c-2b3d622 308->310 310->309
                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 02B3D536
                              • GetCurrentThread.KERNEL32 ref: 02B3D573
                              • GetCurrentProcess.KERNEL32 ref: 02B3D5B0
                              • GetCurrentThreadId.KERNEL32 ref: 02B3D609
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: 0b51e535cd1e1913b42048cc000413366cde4a18d55fa91d6b880be20c91979f
                              • Instruction ID: c7a1d3009f950c3c229632fa4595a4f93d5b19bde53fbb482b6175ce139b085c
                              • Opcode Fuzzy Hash: 0b51e535cd1e1913b42048cc000413366cde4a18d55fa91d6b880be20c91979f
                              • Instruction Fuzzy Hash: A75174B1900749CFDB14CFAAD548B9EBBF5EF88314F208099E019AB3A1DB749944CF65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 317 2b3d4b8-2b3d547 GetCurrentProcess 321 2b3d550-2b3d584 GetCurrentThread 317->321 322 2b3d549-2b3d54f 317->322 323 2b3d586-2b3d58c 321->323 324 2b3d58d-2b3d5c1 GetCurrentProcess 321->324 322->321 323->324 325 2b3d5c3-2b3d5c9 324->325 326 2b3d5ca-2b3d5e5 call 2b3d688 324->326 325->326 330 2b3d5eb-2b3d61a GetCurrentThreadId 326->330 331 2b3d623-2b3d685 330->331 332 2b3d61c-2b3d622 330->332 332->331
                              APIs
                              • GetCurrentProcess.KERNEL32 ref: 02B3D536
                              • GetCurrentThread.KERNEL32 ref: 02B3D573
                              • GetCurrentProcess.KERNEL32 ref: 02B3D5B0
                              • GetCurrentThreadId.KERNEL32 ref: 02B3D609
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: Current$ProcessThread
                              • String ID:
                              • API String ID: 2063062207-0
                              • Opcode ID: a379a010ad6da0dc73e50bfb0d128eebfa028d9f56999dfdf57d9b7d3033ebab
                              • Instruction ID: aceece2dbd4eb706ffba05bd849c9a0e60be4fbfa2c1c2e6a1c89460803eae12
                              • Opcode Fuzzy Hash: a379a010ad6da0dc73e50bfb0d128eebfa028d9f56999dfdf57d9b7d3033ebab
                              • Instruction Fuzzy Hash: 5B5175B1900649CFDB14CFAAD548B9EBBF5EF88314F208059E009AB3A1DB749944CF65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 361 2b3b0f8-2b3b117 362 2b3b143-2b3b147 361->362 363 2b3b119-2b3b126 call 2b3a48c 361->363 365 2b3b15b-2b3b19c 362->365 366 2b3b149-2b3b153 362->366 369 2b3b128 363->369 370 2b3b13c 363->370 372 2b3b1a9-2b3b1b7 365->372 373 2b3b19e-2b3b1a6 365->373 366->365 419 2b3b12e call 2b3b7a0 369->419 420 2b3b12e call 2b3b78f 369->420 370->362 374 2b3b1db-2b3b1dd 372->374 375 2b3b1b9-2b3b1be 372->375 373->372 380 2b3b1e0-2b3b1e7 374->380 377 2b3b1c0-2b3b1c7 call 2b3a498 375->377 378 2b3b1c9 375->378 376 2b3b134-2b3b136 376->370 379 2b3b278-2b3b338 376->379 382 2b3b1cb-2b3b1d9 377->382 378->382 412 2b3b340-2b3b36b GetModuleHandleW 379->412 413 2b3b33a-2b3b33d 379->413 383 2b3b1f4-2b3b1fb 380->383 384 2b3b1e9-2b3b1f1 380->384 382->380 387 2b3b208-2b3b211 call 2b3a4a8 383->387 388 2b3b1fd-2b3b205 383->388 384->383 392 2b3b213-2b3b21b 387->392 393 2b3b21e-2b3b223 387->393 388->387 392->393 394 2b3b241-2b3b245 393->394 395 2b3b225-2b3b22c 393->395 417 2b3b248 call 2b3ba71 394->417 418 2b3b248 call 2b3baa0 394->418 395->394 397 2b3b22e-2b3b23e call 2b3a4b8 call 2b3a4c8 395->397 397->394 400 2b3b24b-2b3b24e 402 2b3b271-2b3b277 400->402 403 2b3b250-2b3b26e 400->403 403->402 414 2b3b374-2b3b388 412->414 415 2b3b36d-2b3b373 412->415 413->412 415->414 417->400 418->400 419->376 420->376
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02B3B35E
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 0a9ac753555a3d4dc54506682ae0be1286099c105098196363ffc7a2d8e38fed
                              • Instruction ID: 9e619d25682271da244c854590d239635c8d104f5c50ac356422ca47b008f646
                              • Opcode Fuzzy Hash: 0a9ac753555a3d4dc54506682ae0be1286099c105098196363ffc7a2d8e38fed
                              • Instruction Fuzzy Hash: ED816370A00B058FDB25DF2AD44579ABBF1FF88308F108A6DD48ADBA44DB75E845CB90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 421 2b34514-2b359d9 CreateActCtxA 424 2b359e2-2b35a3c 421->424 425 2b359db-2b359e1 421->425 432 2b35a4b-2b35a4f 424->432 433 2b35a3e-2b35a41 424->433 425->424 434 2b35a51-2b35a5d 432->434 435 2b35a60-2b35a90 432->435 433->432 434->435 439 2b35a42-2b35a4a 435->439 440 2b35a92-2b35b14 435->440 439->432 443 2b359cf-2b359d9 439->443 443->424 443->425
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02B359C9
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 181b1588901494d9bd67bd21694bc53805631f963ca20cd2b7ca899d333e08ce
                              • Instruction ID: 6d6340dc40a25703c9da685ef6a88f9fcb1de74795c263f70239df1dd2edd3fe
                              • Opcode Fuzzy Hash: 181b1588901494d9bd67bd21694bc53805631f963ca20cd2b7ca899d333e08ce
                              • Instruction Fuzzy Hash: 5741D0B0C0071DCBDB24CFAAC885B8DBBF5BF48304F6081AAD418AB255DB756946CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 444 2b3590c-2b359d9 CreateActCtxA 446 2b359e2-2b35a3c 444->446 447 2b359db-2b359e1 444->447 454 2b35a4b-2b35a4f 446->454 455 2b35a3e-2b35a41 446->455 447->446 456 2b35a51-2b35a5d 454->456 457 2b35a60-2b35a90 454->457 455->454 456->457 461 2b35a42-2b35a4a 457->461 462 2b35a92-2b35b14 457->462 461->454 465 2b359cf-2b359d9 461->465 465->446 465->447
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02B359C9
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 2bbcf9443210eb8660ee260195f3511dfc474df6f74b9d65d802a462d1837d7a
                              • Instruction ID: ef5ac5199e7e5c882361dc42849103932eeac795aae27d9cab39922767895ec4
                              • Opcode Fuzzy Hash: 2bbcf9443210eb8660ee260195f3511dfc474df6f74b9d65d802a462d1837d7a
                              • Instruction Fuzzy Hash: 6C41F2B0C00719CADB24CFA9C985B8DBBF1BF48304F6084AAD418AB251DB75694ACF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 466 2b3d6f9-2b3d6fb 467 2b3d700-2b3d794 DuplicateHandle 466->467 468 2b3d796-2b3d79c 467->468 469 2b3d79d-2b3d7ba 467->469 468->469
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B3D787
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 4981b1d20d50bbf6cf02d16d3ccdbb03062bbbbab346e0d19f77855c65b700d1
                              • Instruction ID: 406ae236130a812b8085c8d3f4658d7a4621b3c71b52ff6e8a2fa0ea7aade332
                              • Opcode Fuzzy Hash: 4981b1d20d50bbf6cf02d16d3ccdbb03062bbbbab346e0d19f77855c65b700d1
                              • Instruction Fuzzy Hash: 9D2116B5900249DFDB10CF9AD984ADEBBF4EB48320F14841AE918B3310C375A940CFA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 472 2b3d700-2b3d794 DuplicateHandle 473 2b3d796-2b3d79c 472->473 474 2b3d79d-2b3d7ba 472->474 473->474
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B3D787
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 2af4e6d7893fd3da20b3c489806e4d27d027b19145dec1bbcfc5429c423fa3fc
                              • Instruction ID: d8347e7b3f7cf9a175c4298fb2bfc2f7ab14f42e829ef8d2080c2c98b3295104
                              • Opcode Fuzzy Hash: 2af4e6d7893fd3da20b3c489806e4d27d027b19145dec1bbcfc5429c423fa3fc
                              • Instruction Fuzzy Hash: 3921C4B5900249DFDB10CF9AD984ADEBBF8EB48320F14845AE918A7350D379A944CFA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 477 2b3b2f8-2b3b338 478 2b3b340-2b3b36b GetModuleHandleW 477->478 479 2b3b33a-2b3b33d 477->479 480 2b3b374-2b3b388 478->480 481 2b3b36d-2b3b373 478->481 479->478 481->480
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02B3B35E
                              Memory Dump Source
                              • Source File: 00000008.00000002.1579165804.0000000002B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B30000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_2b30000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 401b5486eebfd499604bb5ef29df191e03538d90620a98f694daafc32844c5fc
                              • Instruction ID: d0cef484e497491ac6fff05fceef9fb10361f3ec3d196942478584d7ac859052
                              • Opcode Fuzzy Hash: 401b5486eebfd499604bb5ef29df191e03538d90620a98f694daafc32844c5fc
                              • Instruction Fuzzy Hash: 1211DFB6D006598FCB14CF9AC544ADEFBF4EB88228F14855AD429A7210C379A545CFA1
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577834939.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_108d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6e44fd73f2c2f37c1bbe9bb405e23df333f9d76f5ebdd0e3d791a02c0b03628
                              • Instruction ID: ffce0eefe455a4dedc1b37a39f1d04928b1c03e31797ea3cda1a4df5bc18b3f0
                              • Opcode Fuzzy Hash: b6e44fd73f2c2f37c1bbe9bb405e23df333f9d76f5ebdd0e3d791a02c0b03628
                              • Instruction Fuzzy Hash: C7212B71508240DFDB05EF58D5C0F26BFA5FB88318F24C6AAD9850B296C336D456C7B1
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577922250.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_109d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8b8b89a80ba8bedc6a84a69ea3bd1f8bf07e7f7f4bb86dc4fa63102242eda6ed
                              • Instruction ID: 449e7e461611371b2cc177198ee6080cf6ab1d5a3eca6aa19d85e7d04a0a1e45
                              • Opcode Fuzzy Hash: 8b8b89a80ba8bedc6a84a69ea3bd1f8bf07e7f7f4bb86dc4fa63102242eda6ed
                              • Instruction Fuzzy Hash: E0212571544200DFDF15DF98D490B16BBA5FBC8354F24C9ADE98A4B246C33AD407DB61
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577922250.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_109d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cec10efb44124a2f7aa8a010918c11fd1cdf33d6a2496f4c7e9d0f53bc9dde01
                              • Instruction ID: 699de0d44ea545facc8d2c2317de4300dfa9fda2742022e623a3980aaea9d2ab
                              • Opcode Fuzzy Hash: cec10efb44124a2f7aa8a010918c11fd1cdf33d6a2496f4c7e9d0f53bc9dde01
                              • Instruction Fuzzy Hash: 9E2137B1544200EFDF45DF98D5D0B26BBA5FB98324F24C5EDE9894B282C336D406DB61
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577834939.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_108d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                              • Instruction ID: 0846159f3832c33869eee837866d8f687fe0c1ad0d54426768c13436436c0868
                              • Opcode Fuzzy Hash: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                              • Instruction Fuzzy Hash: 70110372404280CFDB12DF54D5C0B16BFB1FB84314F24C6AAD9890B657C33AD45ACBA1
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577922250.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_109d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                              • Instruction ID: c0d0c1395d9c923690a22363825551a429e5bf8d59b4d5b2a3a40bc2b1288324
                              • Opcode Fuzzy Hash: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                              • Instruction Fuzzy Hash: 6D11BB75544280DFDB12CF54C5D0B15BBA1FB84224F24C6E9D8894B296C33AD40ADB61
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577922250.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_109d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                              • Instruction ID: 9328a0e65bc52e1f1c009733851326a4ee4408e10ad950954029f8d7d47f917a
                              • Opcode Fuzzy Hash: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                              • Instruction Fuzzy Hash: 2811DD75544280CFDB12CF58D5D4B15FFA2FB84314F24C6AAE8894B696C33AD40ACBA2
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577834939.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_108d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a7062ec8cad40642c7730cdd7acc63e4fcd18ade1f335fbcd86ea7d31faa0bdd
                              • Instruction ID: 83b9e9c04451ca10c5d9b430ee0fcac5205386eb9075d3b95c7bc2b5d54bb8e9
                              • Opcode Fuzzy Hash: a7062ec8cad40642c7730cdd7acc63e4fcd18ade1f335fbcd86ea7d31faa0bdd
                              • Instruction Fuzzy Hash: F901FC710083849AE710BA5ACC8477ABFE8FF40320F18CA59EDC94F1C2E2789840C771
                              Memory Dump Source
                              • Source File: 00000008.00000002.1577834939.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_8_2_108d000_OlhQyptevOgDP.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45834f901c94e097b788a4dd4bfd930e53a76b4ec9cfbd2e569b056249d1a566
                              • Instruction ID: 17f1a4deb64385806db3bfab460aa929cf23a6b473fc25bd4a342e4802838d3e
                              • Opcode Fuzzy Hash: 45834f901c94e097b788a4dd4bfd930e53a76b4ec9cfbd2e569b056249d1a566
                              • Instruction Fuzzy Hash: 41F09C72404384AEE7119A1ACD84B66FFD8EB41734F14C55AED484F2C7D3799845CB71

                              Execution Graph

                              Execution Coverage:1.1%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:4.6%
                              Total number of Nodes:517
                              Total number of Limit Nodes:9
                              execution_graph 47138 404e26 WaitForSingleObject 47139 404e40 SetEvent CloseHandle 47138->47139 47140 404e57 closesocket 47138->47140 47141 404ed8 47139->47141 47142 404e64 47140->47142 47143 404e7a 47142->47143 47151 4050e4 83 API calls 47142->47151 47145 404e8c WaitForSingleObject 47143->47145 47146 404ece SetEvent CloseHandle 47143->47146 47152 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47145->47152 47146->47141 47148 404e9b SetEvent WaitForSingleObject 47153 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47148->47153 47150 404eb3 SetEvent CloseHandle CloseHandle 47150->47146 47151->47143 47152->47148 47153->47150 47154 434918 47155 434924 CallCatchBlock 47154->47155 47180 434627 47155->47180 47157 43492b 47159 434954 47157->47159 47475 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47157->47475 47168 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47159->47168 47476 4442d2 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47159->47476 47161 43496d 47163 434973 CallCatchBlock 47161->47163 47477 444276 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47161->47477 47164 4349f3 47191 434ba5 47164->47191 47168->47164 47478 443487 35 API calls 6 library calls 47168->47478 47175 434a1f 47177 434a28 47175->47177 47479 443462 28 API calls _Atexit 47175->47479 47480 43479e 13 API calls 2 library calls 47177->47480 47181 434630 47180->47181 47481 434cb6 IsProcessorFeaturePresent 47181->47481 47183 43463c 47482 438fb1 10 API calls 4 library calls 47183->47482 47185 434641 47190 434645 47185->47190 47483 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47185->47483 47187 43464e 47188 43465c 47187->47188 47484 438fda 8 API calls 3 library calls 47187->47484 47188->47157 47190->47157 47485 436f10 47191->47485 47194 4349f9 47195 444223 47194->47195 47487 44f0d9 47195->47487 47197 434a02 47200 40ea00 47197->47200 47198 44422c 47198->47197 47491 446895 35 API calls 47198->47491 47493 41cbe1 LoadLibraryA GetProcAddress 47200->47493 47202 40ea1c GetModuleFileNameW 47498 40f3fe 47202->47498 47204 40ea38 47513 4020f6 47204->47513 47207 4020f6 28 API calls 47208 40ea56 47207->47208 47519 41beac 47208->47519 47212 40ea68 47545 401e8d 47212->47545 47214 40ea71 47215 40ea84 47214->47215 47216 40eace 47214->47216 47575 40fbee 116 API calls 47215->47575 47551 401e65 22 API calls 47216->47551 47219 40eade 47552 401e65 22 API calls 47219->47552 47220 40ea96 47576 401e65 22 API calls 47220->47576 47222 40eaa2 47577 410f72 36 API calls __EH_prolog 47222->47577 47224 40eafd 47553 40531e 28 API calls 47224->47553 47227 40eb0c 47554 406383 28 API calls 47227->47554 47228 40eab4 47578 40fb9f 77 API calls 47228->47578 47231 40eb18 47555 401fe2 47231->47555 47232 40eabd 47579 40f3eb 70 API calls 47232->47579 47238 401fd8 11 API calls 47240 40ef36 47238->47240 47239 401fd8 11 API calls 47241 40eb36 47239->47241 47470 443396 GetModuleHandleW 47240->47470 47567 401e65 22 API calls 47241->47567 47243 40eb3f 47568 401fc0 28 API calls 47243->47568 47245 40eb4a 47569 401e65 22 API calls 47245->47569 47247 40eb63 47570 401e65 22 API calls 47247->47570 47249 40eb7e 47250 40ebe9 47249->47250 47580 406c59 28 API calls 47249->47580 47571 401e65 22 API calls 47250->47571 47253 40ebab 47254 401fe2 28 API calls 47253->47254 47255 40ebb7 47254->47255 47258 401fd8 11 API calls 47255->47258 47256 40ebf6 47257 40ec3d 47256->47257 47582 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 47256->47582 47572 40d0a4 47257->47572 47260 40ebc0 47258->47260 47581 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 47260->47581 47261 40ec43 47262 40eac6 47261->47262 47584 41b354 33 API calls 47261->47584 47262->47238 47265 40ebdf 47265->47250 47267 40f38a 47265->47267 47667 4139e4 30 API calls 47267->47667 47268 40ec5e 47271 40ecb1 47268->47271 47585 407751 RegOpenKeyExA RegQueryValueExA RegCloseKey 47268->47585 47269 40ec21 47269->47257 47583 4139e4 30 API calls 47269->47583 47590 401e65 22 API calls 47271->47590 47275 40ecba 47283 40ecc6 47275->47283 47284 40eccb 47275->47284 47276 40ec79 47278 40ec87 47276->47278 47279 40ec7d 47276->47279 47277 40f3a0 47668 4124b0 65 API calls ___scrt_get_show_window_mode 47277->47668 47588 401e65 22 API calls 47278->47588 47586 407773 30 API calls 47279->47586 47591 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47283->47591 47592 401e65 22 API calls 47284->47592 47285 40ec82 47587 40729b 97 API calls 47285->47587 47290 40f3ba 47670 413a5e RegOpenKeyExW RegDeleteValueW 47290->47670 47291 40ecd4 47593 41bcef 28 API calls 47291->47593 47293 40ec90 47293->47271 47298 40ecac 47293->47298 47295 40ecdf 47594 401f13 28 API calls 47295->47594 47296 40f3cd 47671 401f09 11 API calls 47296->47671 47589 40729b 97 API calls 47298->47589 47301 40ecea 47595 401f09 11 API calls 47301->47595 47302 40f3d7 47672 401f09 11 API calls 47302->47672 47304 40ecf3 47596 401e65 22 API calls 47304->47596 47307 40f3e0 47673 40dd7d 27 API calls 47307->47673 47308 40ecfc 47597 401e65 22 API calls 47308->47597 47310 40f3e5 47674 414f65 167 API calls _strftime 47310->47674 47314 40ed16 47598 401e65 22 API calls 47314->47598 47316 40ed30 47599 401e65 22 API calls 47316->47599 47318 40ed49 47319 40edbb 47318->47319 47600 401e65 22 API calls 47318->47600 47321 40edc5 47319->47321 47326 40ef41 ___scrt_get_show_window_mode 47319->47326 47322 40edce 47321->47322 47328 40ee4a 47321->47328 47606 401e65 22 API calls 47322->47606 47324 40edd7 47607 401e65 22 API calls 47324->47607 47325 40ed5e _wcslen 47325->47319 47601 401e65 22 API calls 47325->47601 47617 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47326->47617 47352 40ee45 ___scrt_get_show_window_mode 47328->47352 47330 40ede9 47608 401e65 22 API calls 47330->47608 47331 40ed79 47602 401e65 22 API calls 47331->47602 47334 40edfb 47609 401e65 22 API calls 47334->47609 47336 40ed8e 47603 40da6f 31 API calls 47336->47603 47337 40ef8c 47618 401e65 22 API calls 47337->47618 47341 40ee24 47610 401e65 22 API calls 47341->47610 47342 40efb1 47619 402093 28 API calls 47342->47619 47343 40eda1 47604 401f13 28 API calls 47343->47604 47345 40edad 47605 401f09 11 API calls 47345->47605 47349 40ee35 47611 40ce34 45 API calls _wcslen 47349->47611 47350 40efc3 47620 4137aa 14 API calls 47350->47620 47351 40edb6 47351->47319 47352->47328 47612 413982 31 API calls 47352->47612 47356 40efd9 47621 401e65 22 API calls 47356->47621 47357 40eede ctype 47613 401e65 22 API calls 47357->47613 47359 40efe5 47622 43bb2c 39 API calls _strftime 47359->47622 47362 40eff2 47365 40f01f 47362->47365 47623 41ce2c 86 API calls ___scrt_get_show_window_mode 47362->47623 47363 40eef5 47363->47337 47614 401e65 22 API calls 47363->47614 47624 402093 28 API calls 47365->47624 47366 40ef12 47615 41bcef 28 API calls 47366->47615 47370 40f003 CreateThread 47370->47365 47783 41d4ee 10 API calls 47370->47783 47371 40f034 47625 402093 28 API calls 47371->47625 47372 40ef1e 47616 40f4af 103 API calls 47372->47616 47375 40f043 47626 41b580 79 API calls 47375->47626 47376 40ef23 47376->47337 47378 40ef2a 47376->47378 47378->47262 47379 40f048 47627 401e65 22 API calls 47379->47627 47381 40f054 47628 401e65 22 API calls 47381->47628 47383 40f066 47629 401e65 22 API calls 47383->47629 47385 40f086 47630 43bb2c 39 API calls _strftime 47385->47630 47387 40f093 47631 401e65 22 API calls 47387->47631 47389 40f09e 47632 401e65 22 API calls 47389->47632 47391 40f0af 47633 401e65 22 API calls 47391->47633 47393 40f0c4 47634 401e65 22 API calls 47393->47634 47395 40f0d5 47396 40f0dc StrToIntA 47395->47396 47635 409e1f 168 API calls _wcslen 47396->47635 47398 40f0ee 47636 401e65 22 API calls 47398->47636 47400 40f0f7 47401 40f13c 47400->47401 47637 43455e 47400->47637 47645 401e65 22 API calls 47401->47645 47406 40f11f 47407 40f126 CreateThread 47406->47407 47407->47401 47785 41a045 102 API calls 2 library calls 47407->47785 47408 40f194 47647 401e65 22 API calls 47408->47647 47409 40f14c 47409->47408 47411 43455e new 22 API calls 47409->47411 47412 40f161 47411->47412 47646 401e65 22 API calls 47412->47646 47414 40f173 47419 40f17a CreateThread 47414->47419 47415 40f207 47653 401e65 22 API calls 47415->47653 47416 40f19d 47416->47415 47648 401e65 22 API calls 47416->47648 47419->47408 47784 41a045 102 API calls 2 library calls 47419->47784 47420 40f1b9 47649 401e65 22 API calls 47420->47649 47421 40f255 47658 41b69e 79 API calls 47421->47658 47422 40f210 47422->47421 47654 401e65 22 API calls 47422->47654 47426 40f1ce 47650 40da23 31 API calls 47426->47650 47427 40f25e 47659 401f13 28 API calls 47427->47659 47428 40f225 47655 401e65 22 API calls 47428->47655 47430 40f269 47660 401f09 11 API calls 47430->47660 47434 40f1e1 47651 401f13 28 API calls 47434->47651 47436 40f272 CreateThread 47441 40f293 CreateThread 47436->47441 47442 40f29f 47436->47442 47786 40f7e2 120 API calls 47436->47786 47437 40f23a 47656 43bb2c 39 API calls _strftime 47437->47656 47438 40f1ed 47652 401f09 11 API calls 47438->47652 47441->47442 47780 412132 137 API calls 47441->47780 47443 40f2b4 47442->47443 47444 40f2a8 CreateThread 47442->47444 47448 40f307 47443->47448 47661 402093 28 API calls 47443->47661 47444->47443 47781 412716 38 API calls ___scrt_get_show_window_mode 47444->47781 47446 40f1f6 CreateThread 47446->47415 47782 401be9 49 API calls _strftime 47446->47782 47447 40f247 47657 40c19d 7 API calls 47447->47657 47663 41353a RegOpenKeyExA RegQueryValueExA RegCloseKey 47448->47663 47451 40f2d7 47662 4052fd 28 API calls 47451->47662 47454 40f31f 47454->47307 47664 41bcef 28 API calls 47454->47664 47459 40f338 47665 413656 31 API calls 47459->47665 47464 40f34e 47666 401f09 11 API calls 47464->47666 47466 40f381 DeleteFileW 47467 40f388 47466->47467 47468 40f359 47466->47468 47669 41bcef 28 API calls 47467->47669 47468->47466 47468->47467 47469 40f36f Sleep 47468->47469 47469->47468 47471 434a15 47470->47471 47471->47175 47472 4434bf 47471->47472 47788 44323c 47472->47788 47475->47157 47476->47161 47477->47168 47478->47164 47479->47177 47480->47163 47481->47183 47482->47185 47483->47187 47484->47190 47486 434bb8 GetStartupInfoW 47485->47486 47486->47194 47488 44f0eb 47487->47488 47489 44f0e2 47487->47489 47488->47198 47492 44efd8 48 API calls 5 library calls 47489->47492 47491->47198 47492->47488 47494 41cc20 LoadLibraryA GetProcAddress 47493->47494 47495 41cc10 GetModuleHandleA GetProcAddress 47493->47495 47496 41cc49 44 API calls 47494->47496 47497 41cc39 LoadLibraryA GetProcAddress 47494->47497 47495->47494 47496->47202 47497->47496 47675 41b539 FindResourceA 47498->47675 47502 40f428 _Yarn 47685 4020b7 47502->47685 47505 401fe2 28 API calls 47506 40f44e 47505->47506 47507 401fd8 11 API calls 47506->47507 47508 40f457 47507->47508 47509 43bda0 new 21 API calls 47508->47509 47510 40f468 _Yarn 47509->47510 47691 406e13 47510->47691 47512 40f49b 47512->47204 47514 40210c 47513->47514 47515 4023ce 11 API calls 47514->47515 47516 402126 47515->47516 47517 402569 28 API calls 47516->47517 47518 402134 47517->47518 47518->47207 47728 4020df 47519->47728 47521 41bf2f 47522 401fd8 11 API calls 47521->47522 47523 41bf61 47522->47523 47524 401fd8 11 API calls 47523->47524 47526 41bf69 47524->47526 47525 41bf31 47744 4041a2 28 API calls 47525->47744 47529 401fd8 11 API calls 47526->47529 47531 40ea5f 47529->47531 47530 41bf3d 47532 401fe2 28 API calls 47530->47532 47541 40fb52 47531->47541 47534 41bf46 47532->47534 47533 401fe2 28 API calls 47540 41bebf 47533->47540 47536 401fd8 11 API calls 47534->47536 47535 401fd8 11 API calls 47535->47540 47537 41bf4e 47536->47537 47538 41cec5 28 API calls 47537->47538 47538->47521 47540->47521 47540->47525 47540->47533 47540->47535 47732 4041a2 28 API calls 47540->47732 47733 41cec5 47540->47733 47542 40fb65 47541->47542 47543 40fb5e 47541->47543 47542->47212 47770 402163 11 API calls 47543->47770 47546 402163 47545->47546 47550 40219f 47546->47550 47771 402730 11 API calls 47546->47771 47548 402184 47772 402712 11 API calls std::_Deallocate 47548->47772 47550->47214 47551->47219 47552->47224 47553->47227 47554->47231 47556 401ff1 47555->47556 47563 402039 47555->47563 47557 4023ce 11 API calls 47556->47557 47558 401ffa 47557->47558 47559 40203c 47558->47559 47560 402015 47558->47560 47774 40267a 11 API calls 47559->47774 47773 403098 28 API calls 47560->47773 47564 401fd8 47563->47564 47565 4023ce 11 API calls 47564->47565 47566 401fe1 47565->47566 47566->47239 47567->47243 47568->47245 47569->47247 47570->47249 47571->47256 47775 401fab 47572->47775 47574 40d0ae CreateMutexA GetLastError 47574->47261 47575->47220 47576->47222 47577->47228 47578->47232 47580->47253 47581->47265 47582->47269 47583->47257 47584->47268 47585->47276 47586->47285 47587->47278 47588->47293 47589->47271 47590->47275 47591->47284 47592->47291 47593->47295 47594->47301 47595->47304 47596->47308 47597->47314 47598->47316 47599->47318 47600->47325 47601->47331 47602->47336 47603->47343 47604->47345 47605->47351 47606->47324 47607->47330 47608->47334 47609->47341 47610->47349 47611->47352 47612->47357 47613->47363 47614->47366 47615->47372 47616->47376 47617->47337 47618->47342 47619->47350 47620->47356 47621->47359 47622->47362 47623->47370 47624->47371 47625->47375 47626->47379 47627->47381 47628->47383 47629->47385 47630->47387 47631->47389 47632->47391 47633->47393 47634->47395 47635->47398 47636->47400 47639 434563 47637->47639 47638 43bda0 new 21 API calls 47638->47639 47639->47638 47640 40f10c 47639->47640 47776 443001 7 API calls 2 library calls 47639->47776 47777 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47639->47777 47778 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47639->47778 47644 401e65 22 API calls 47640->47644 47644->47406 47645->47409 47646->47414 47647->47416 47648->47420 47649->47426 47650->47434 47651->47438 47652->47446 47653->47422 47654->47428 47655->47437 47656->47447 47657->47421 47658->47427 47659->47430 47660->47436 47661->47451 47663->47454 47664->47459 47665->47464 47666->47468 47667->47277 47669->47290 47670->47296 47671->47302 47672->47307 47673->47310 47779 41ada8 103 API calls 47674->47779 47676 41b556 LoadResource LockResource SizeofResource 47675->47676 47677 40f419 47675->47677 47676->47677 47678 43bda0 47677->47678 47684 4461b8 ___crtLCMapStringA 47678->47684 47679 4461f6 47695 44062d 20 API calls __dosmaperr 47679->47695 47681 4461e1 RtlAllocateHeap 47682 4461f4 47681->47682 47681->47684 47682->47502 47684->47679 47684->47681 47694 443001 7 API calls 2 library calls 47684->47694 47686 4020bf 47685->47686 47696 4023ce 47686->47696 47688 4020ca 47700 40250a 47688->47700 47690 4020d9 47690->47505 47692 4020b7 28 API calls 47691->47692 47693 406e27 47692->47693 47693->47512 47694->47684 47695->47682 47697 402428 47696->47697 47698 4023d8 47696->47698 47697->47688 47698->47697 47707 4027a7 11 API calls std::_Deallocate 47698->47707 47701 40251a 47700->47701 47702 402520 47701->47702 47703 402535 47701->47703 47708 402569 47702->47708 47718 4028e8 28 API calls 47703->47718 47706 402533 47706->47690 47707->47697 47719 402888 47708->47719 47710 40257d 47711 402592 47710->47711 47712 4025a7 47710->47712 47724 402a34 22 API calls 47711->47724 47726 4028e8 28 API calls 47712->47726 47715 40259b 47725 4029da 22 API calls 47715->47725 47717 4025a5 47717->47706 47718->47706 47721 402890 47719->47721 47720 402898 47720->47710 47721->47720 47727 402ca3 22 API calls 47721->47727 47724->47715 47725->47717 47726->47717 47729 4020e7 47728->47729 47730 4023ce 11 API calls 47729->47730 47731 4020f2 47730->47731 47731->47540 47732->47540 47734 41ced2 47733->47734 47735 41cf31 47734->47735 47739 41cee2 47734->47739 47736 41cf4b 47735->47736 47737 41d071 28 API calls 47735->47737 47754 41d1d7 28 API calls 47736->47754 47737->47736 47740 41cf1a 47739->47740 47745 41d071 47739->47745 47753 41d1d7 28 API calls 47740->47753 47741 41cf2d 47741->47540 47744->47530 47747 41d079 47745->47747 47746 41d0ab 47746->47740 47747->47746 47748 41d0af 47747->47748 47751 41d093 47747->47751 47765 402725 22 API calls 47748->47765 47755 41d0e2 47751->47755 47753->47741 47754->47741 47756 41d0ec __EH_prolog 47755->47756 47766 402717 22 API calls 47756->47766 47758 41d0ff 47767 41d1ee 11 API calls 47758->47767 47760 41d125 47761 41d15d 47760->47761 47768 402730 11 API calls 47760->47768 47761->47746 47763 41d144 47769 402712 11 API calls std::_Deallocate 47763->47769 47766->47758 47767->47760 47768->47763 47769->47761 47770->47542 47771->47548 47772->47550 47773->47563 47774->47563 47776->47639 47787 412829 61 API calls 47780->47787 47789 443248 _Atexit 47788->47789 47790 443396 _Atexit GetModuleHandleW 47789->47790 47798 443260 47789->47798 47792 443254 47790->47792 47792->47798 47822 4433da GetModuleHandleExW 47792->47822 47793 443268 47797 4432dd 47793->47797 47809 443306 47793->47809 47830 443ff0 20 API calls _Atexit 47793->47830 47801 4432f5 47797->47801 47831 444276 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47797->47831 47810 445909 EnterCriticalSection 47798->47810 47799 443323 47814 443355 47799->47814 47800 44334f 47833 4577a9 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47800->47833 47832 444276 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47801->47832 47811 443346 47809->47811 47810->47793 47834 445951 LeaveCriticalSection 47811->47834 47813 44331f 47813->47799 47813->47800 47835 448d49 47814->47835 47817 443383 47820 4433da _Atexit 8 API calls 47817->47820 47818 443363 GetPEB 47818->47817 47819 443373 GetCurrentProcess TerminateProcess 47818->47819 47819->47817 47821 44338b ExitProcess 47820->47821 47823 443404 GetProcAddress 47822->47823 47824 443427 47822->47824 47825 443419 47823->47825 47826 443436 47824->47826 47827 44342d FreeLibrary 47824->47827 47825->47824 47828 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 47826->47828 47827->47826 47829 443440 47828->47829 47829->47798 47830->47797 47831->47801 47832->47809 47834->47813 47836 448d64 47835->47836 47837 448d6e 47835->47837 47848 43502b 47836->47848 47841 44854a 47837->47841 47840 44335f 47840->47817 47840->47818 47842 448576 47841->47842 47843 44857a 47841->47843 47842->47843 47847 44859a 47842->47847 47855 4485e6 47842->47855 47843->47836 47845 4485a6 GetProcAddress 47846 4485b6 __crt_fast_encode_pointer 47845->47846 47846->47843 47847->47843 47847->47845 47849 435036 IsProcessorFeaturePresent 47848->47849 47850 435034 47848->47850 47852 435078 47849->47852 47850->47840 47862 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47852->47862 47854 43515b 47854->47840 47856 448607 LoadLibraryExW 47855->47856 47859 4485fc 47855->47859 47857 448624 GetLastError 47856->47857 47858 44863c 47856->47858 47857->47858 47860 44862f LoadLibraryExW 47857->47860 47858->47859 47861 448653 FreeLibrary 47858->47861 47859->47842 47860->47858 47861->47859 47862->47854 47863 40165e 47864 401666 47863->47864 47865 401669 47863->47865 47866 4016a8 47865->47866 47868 401696 47865->47868 47867 43455e new 22 API calls 47866->47867 47870 40169c 47867->47870 47869 43455e new 22 API calls 47868->47869 47869->47870

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                              • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                              • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                              • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                              • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$LibraryLoad$HandleModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 4236061018-3687161714
                              • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                              • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                              • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                              • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 465 443355-443361 call 448d49 468 443383-44338f call 4433da ExitProcess 465->468 469 443363-443371 GetPEB 465->469 469->468 470 443373-44337d GetCurrentProcess TerminateProcess 469->470 470->468
                              APIs
                              • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG,004461B7,00000003), ref: 00443376
                              • TerminateProcess.KERNEL32(00000000), ref: 0044337D
                              • ExitProcess.KERNEL32 ref: 0044338F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID: PkGNG
                              • API String ID: 1703294689-263838557
                              • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                              • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                              • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                              • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 100 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->100 79 40ec06-40ec25 call 401fab call 413584 70->79 80 40ec3e call 40d0a4 70->80 79->80 99 40ec27-40ec3d call 401fab call 4139e4 79->99 86 40ec43-40ec45 80->86 89 40ec47-40ec49 86->89 90 40ec4e-40ec55 86->90 93 40ef2c 89->93 94 40ec57 90->94 95 40ec59-40ec65 call 41b354 90->95 93->49 94->95 105 40ec67-40ec69 95->105 106 40ec6e-40ec72 95->106 99->80 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 100->126 105->106 108 40ecb1-40ecc4 call 401e65 call 401fab 106->108 109 40ec74-40ec7b call 407751 106->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 120 40ec87-40ec9a call 401e65 call 401fab 109->120 121 40ec7d-40ec82 call 407773 call 40729b 109->121 120->108 141 40ec9c-40eca2 120->141 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 141->108 145 40eca4-40ecaa 141->145 145->108 148 40ecac call 40729b 145->148 148->108 177->178 204 40ed70-40ed74 call 401e65 177->204 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 234 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->234 183 40ee4a-40ee54 call 409092 181->183 184 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->184 190 40ee59-40ee7d call 40247c call 434829 183->190 184->190 212 40ee8c 190->212 213 40ee7f-40ee8a call 436f10 190->213 214 40ed79-40edb6 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 204->214 218 40ee8e-40ef03 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 call 434832 call 401e65 call 40b9f8 212->218 213->218 214->178 218->234 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 218->286 287 40f017-40f019 234->287 288 40effc 234->288 286->234 306 40ef2a 286->306 291 40f01b-40f01d 287->291 292 40f01f 287->292 290 40effe-40f015 call 41ce2c CreateThread 288->290 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 291->290 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->93 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 357 40f194-40f1a7 call 401e65 call 401fab 346->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->358 367 40f207-40f21a call 401e65 call 401fab 357->367 368 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->368 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 367->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 367->380 368->367 402 40f27b 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 406 40f293-40f29d CreateThread 403->406 407 40f29f-40f2a6 403->407 406->407 408 40f2b4-40f2bb 407->408 409 40f2a8-40f2b2 CreateThread 407->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f322 call 401fab call 41353a 413->416 415->418 416->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 416->427 418->416 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                              APIs
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe,00000104), ref: 0040EA29
                                • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                              • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                              • API String ID: 2830904901-3059141071
                              • Opcode ID: faaf597f9ba31a578cff63a99c76a37e9239b7d9982a30c10bb73a990bef0fa7
                              • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                              • Opcode Fuzzy Hash: faaf597f9ba31a578cff63a99c76a37e9239b7d9982a30c10bb73a990bef0fa7
                              • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                              Control-flow Graph

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                              • SetEvent.KERNEL32(?), ref: 00404E43
                              • CloseHandle.KERNELBASE(?), ref: 00404E4C
                              • closesocket.WS2_32(?), ref: 00404E5A
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                              • SetEvent.KERNEL32(?), ref: 00404EA2
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                              • SetEvent.KERNEL32(?), ref: 00404EBA
                              • CloseHandle.KERNEL32(?), ref: 00404EBF
                              • CloseHandle.KERNEL32(?), ref: 00404EC4
                              • SetEvent.KERNEL32(?), ref: 00404ED1
                              • CloseHandle.KERNEL32(?), ref: 00404ED6
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                              • String ID: PkGNG
                              • API String ID: 3658366068-263838557
                              • Opcode ID: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                              • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                              • Opcode Fuzzy Hash: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                              • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 473 4485e6-4485fa 474 448607-448622 LoadLibraryExW 473->474 475 4485fc-448605 473->475 476 448624-44862d GetLastError 474->476 477 44864b-448651 474->477 478 44865e-448660 475->478 479 44863c 476->479 480 44862f-44863a LoadLibraryExW 476->480 481 448653-448654 FreeLibrary 477->481 482 44865a 477->482 483 44863e-448640 479->483 480->483 481->482 484 44865c-44865d 482->484 483->477 485 448642-448649 483->485 484->478 485->484
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                              • GetLastError.KERNEL32(?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                              • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                              • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                              • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 486 40d0a4-40d0d0 call 401fab CreateMutexA GetLastError
                              APIs
                              • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                              • GetLastError.KERNEL32 ref: 0040D0BE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: SG
                              • API String ID: 1925916568-3189917014
                              • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                              • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                              • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                              • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 489 44854a-448574 490 448576-448578 489->490 491 4485df 489->491 492 44857e-448584 490->492 493 44857a-44857c 490->493 494 4485e1-4485e5 491->494 495 448586-448588 call 4485e6 492->495 496 4485a0 492->496 493->494 499 44858d-448590 495->499 498 4485a2-4485a4 496->498 500 4485a6-4485b4 GetProcAddress 498->500 501 4485cf-4485dd 498->501 502 4485c1-4485c7 499->502 503 448592-448598 499->503 504 4485b6-4485bf call 434591 500->504 505 4485c9 500->505 501->491 502->498 503->495 506 44859a 503->506 504->493 505->501 506->496
                              APIs
                              • GetProcAddress.KERNEL32(00000000,?), ref: 004485AA
                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc__crt_fast_encode_pointer
                              • String ID:
                              • API String ID: 2279764990-0
                              • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                              • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                              • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                              • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 509 40165e-401664 510 401666-401668 509->510 511 401669-401674 509->511 512 401676 511->512 513 40167b-401685 511->513 512->513 514 401687-40168d 513->514 515 4016a8-4016a9 call 43455e 513->515 514->515 516 40168f-401694 514->516 519 4016ae-4016af 515->519 516->512 518 401696-4016a6 call 43455e 516->518 521 4016b1-4016b3 518->521 519->521
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                              • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                              • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                              • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 537 4461b8-4461c4 538 4461f6-446201 call 44062d 537->538 539 4461c6-4461c8 537->539 546 446203-446205 538->546 541 4461e1-4461f2 RtlAllocateHeap 539->541 542 4461ca-4461cb 539->542 543 4461f4 541->543 544 4461cd-4461d4 call 4455c6 541->544 542->541 543->546 544->538 549 4461d6-4461df call 443001 544->549 549->538 549->541
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                              • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                              • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                              • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00407CF4
                              • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                              • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                              • DeleteFileA.KERNEL32(?), ref: 0040868D
                                • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                              • Sleep.KERNEL32(000007D0), ref: 00408733
                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                              • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                              • API String ID: 1067849700-181434739
                              • Opcode ID: 386568ea35fe2c71690d1af1043c536d771b930e6ed81d06046e5373954323ac
                              • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                              • Opcode Fuzzy Hash: 386568ea35fe2c71690d1af1043c536d771b930e6ed81d06046e5373954323ac
                              • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004056E6
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • __Init_thread_footer.LIBCMT ref: 00405723
                              • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                              • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                              • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                              • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                              • CloseHandle.KERNEL32 ref: 00405A23
                              • CloseHandle.KERNEL32 ref: 00405A2B
                              • CloseHandle.KERNEL32 ref: 00405A3D
                              • CloseHandle.KERNEL32 ref: 00405A45
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                              • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                              • API String ID: 2994406822-18413064
                              • Opcode ID: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                              • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                              • Opcode Fuzzy Hash: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                              • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00412141
                                • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                              • CloseHandle.KERNEL32(00000000), ref: 00412190
                              • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                              • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                              • API String ID: 3018269243-13974260
                              • Opcode ID: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                              • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                              • Opcode Fuzzy Hash: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                              • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                              • FindClose.KERNEL32(00000000), ref: 0040BC04
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                              • FindClose.KERNEL32(00000000), ref: 0040BD4D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                              • API String ID: 1164774033-3681987949
                              • Opcode ID: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                              • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                              • Opcode Fuzzy Hash: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                              • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                              APIs
                              • OpenClipboard.USER32 ref: 004168FD
                              • EmptyClipboard.USER32 ref: 0041690B
                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                              • GlobalLock.KERNEL32(00000000), ref: 00416934
                              • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                              • CloseClipboard.USER32 ref: 00416990
                              • OpenClipboard.USER32 ref: 00416997
                              • GetClipboardData.USER32(0000000D), ref: 004169A7
                              • GlobalLock.KERNEL32(00000000), ref: 004169B0
                              • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                              • CloseClipboard.USER32 ref: 004169BF
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                              • String ID: !D@
                              • API String ID: 3520204547-604454484
                              • Opcode ID: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                              • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                              • Opcode Fuzzy Hash: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                              • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                              • FindClose.KERNEL32(00000000), ref: 0040BE04
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                              • FindClose.KERNEL32(00000000), ref: 0040BEEA
                              • FindClose.KERNEL32(00000000), ref: 0040BF0B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$File$FirstNext
                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 3527384056-432212279
                              • Opcode ID: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                              • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                              • Opcode Fuzzy Hash: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                              • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                              APIs
                              • __EH_prolog.LIBCMT ref: 0041A04A
                              • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                              • Sleep.KERNEL32(000003E8), ref: 0041A18E
                              • GetLocalTime.KERNEL32(?), ref: 0041A196
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                              • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                              • API String ID: 489098229-1431523004
                              • Opcode ID: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                              • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                              • Opcode Fuzzy Hash: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                              • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                              • API String ID: 3756808967-1743721670
                              • Opcode ID: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                              • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                              • Opcode Fuzzy Hash: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                              • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7$VG
                              • API String ID: 0-1861860590
                              • Opcode ID: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                              • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                              • Opcode Fuzzy Hash: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                              • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                              APIs
                              • _wcslen.LIBCMT ref: 0040755C
                              • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-3166923314
                              • Opcode ID: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                              • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                              • Opcode Fuzzy Hash: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                              • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                              • GetLastError.KERNEL32 ref: 0041A84C
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                              • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                              • Opcode Fuzzy Hash: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                              • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                              • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                              • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                              • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                              • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID: JD$JD$JD
                              • API String ID: 745075371-3517165026
                              • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                              • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                              • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                              • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                              • FindClose.KERNEL32(00000000), ref: 0040C4B8
                              • FindClose.KERNEL32(00000000), ref: 0040C4E3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 1164774033-405221262
                              • Opcode ID: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                              • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                              • Opcode Fuzzy Hash: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                              • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                              • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                              • GetLastError.KERNEL32 ref: 0040A328
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                              • TranslateMessage.USER32(?), ref: 0040A385
                              • DispatchMessageA.USER32(?), ref: 0040A390
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error $`ou
                              • API String ID: 3219506041-93350570
                              • Opcode ID: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                              • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                              • Opcode Fuzzy Hash: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                              • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C41F
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C42C
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                              • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C44D
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C473
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID:
                              • API String ID: 2341273852-0
                              • Opcode ID: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                              • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                              • Opcode Fuzzy Hash: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                              • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$CreateFirstNext
                              • String ID: 8SG$PXG$PXG$NG$PG
                              • API String ID: 341183262-3812160132
                              • Opcode ID: cd9425940f8db8ef2b08a2b33307d693326731427aae5be40ce922e7e20f00f0
                              • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                              • Opcode Fuzzy Hash: cd9425940f8db8ef2b08a2b33307d693326731427aae5be40ce922e7e20f00f0
                              • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                              APIs
                              • GetForegroundWindow.USER32 ref: 0040A451
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                              • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                              • GetKeyState.USER32(00000010), ref: 0040A46E
                              • GetKeyboardState.USER32(?), ref: 0040A479
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                              • String ID:
                              • API String ID: 1888522110-0
                              • Opcode ID: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                              • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                              • Opcode Fuzzy Hash: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                              • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                              APIs
                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                              • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCloseCreateLibraryLoadProcsend
                              • String ID: SHDeleteKeyW$Shlwapi.dll
                              • API String ID: 2127411465-314212984
                              • Opcode ID: 79fdb5d939c4fda9ab65d5331e207ccd9125177c2b07759bb8af03fe36f6d8de
                              • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                              • Opcode Fuzzy Hash: 79fdb5d939c4fda9ab65d5331e207ccd9125177c2b07759bb8af03fe36f6d8de
                              • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                              APIs
                              • _free.LIBCMT ref: 00449292
                              • _free.LIBCMT ref: 004492B6
                              • _free.LIBCMT ref: 0044943D
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                              • _free.LIBCMT ref: 00449609
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                              • String ID:
                              • API String ID: 314583886-0
                              • Opcode ID: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                              • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                              • Opcode Fuzzy Hash: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                              • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                              APIs
                                • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                              • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                              • String ID: !D@$PowrProf.dll$SetSuspendState
                              • API String ID: 1589313981-2876530381
                              • Opcode ID: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                              • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                              • Opcode Fuzzy Hash: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                              • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                              APIs
                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                              • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                              • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                              Strings
                              • http://geoplugin.net/json.gp, xrefs: 0041B448
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleOpen$FileRead
                              • String ID: http://geoplugin.net/json.gp
                              • API String ID: 3121278467-91888290
                              • Opcode ID: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                              • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                              • Opcode Fuzzy Hash: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                              • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                              • GetLastError.KERNEL32 ref: 0040BA93
                              Strings
                              • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                              • UserProfile, xrefs: 0040BA59
                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                              • [Chrome StoredLogins not found], xrefs: 0040BAAD
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • API String ID: 2018770650-1062637481
                              • Opcode ID: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                              • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                              • Opcode Fuzzy Hash: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                              • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                              • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                              • GetLastError.KERNEL32 ref: 004179D8
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 3534403312-3733053543
                              • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                              • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                              • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                              • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                              APIs
                              • __EH_prolog.LIBCMT ref: 00409293
                                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                              • FindClose.KERNEL32(00000000), ref: 004093FC
                                • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                • Part of subcall function 00404E26: CloseHandle.KERNELBASE(?), ref: 00404E4C
                              • FindClose.KERNEL32(00000000), ref: 004095F4
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                              • String ID:
                              • API String ID: 1824512719-0
                              • Opcode ID: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                              • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                              • Opcode Fuzzy Hash: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                              • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: FSE$FSE$PkGNG
                              • API String ID: 0-1266307253
                              • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                              • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                              • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                              • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ManagerStart
                              • String ID:
                              • API String ID: 276877138-0
                              • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                              • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                              • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                              • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                              APIs
                                • Part of subcall function 00413584: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                • Part of subcall function 00413584: RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                              • Sleep.KERNEL32(00000BB8), ref: 0040F896
                              • ExitProcess.KERNEL32 ref: 0040F905
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 5.1.2 Pro$override$pth_unenc
                              • API String ID: 2281282204-3554326054
                              • Opcode ID: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                              • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                              • Opcode Fuzzy Hash: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                              • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                              APIs
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                              • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                              • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                              • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                              • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                              APIs
                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                              • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                              • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                              • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID: SETTINGS
                              • API String ID: 3473537107-594951305
                              • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                              • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                              • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                              • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                              APIs
                              • __EH_prolog.LIBCMT ref: 004096A5
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                              • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                              • Opcode Fuzzy Hash: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                              • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                              APIs
                              • __EH_prolog.LIBCMT ref: 0040884C
                              • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                              • String ID:
                              • API String ID: 1771804793-0
                              • Opcode ID: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                              • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                              • Opcode Fuzzy Hash: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                              • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadExecuteFileShell
                              • String ID: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe$open
                              • API String ID: 2825088817-1054084238
                              • Opcode ID: 25f93c1eb8c7c2b3408b92261e90d72d92bad6cdb28d287bebca9ae006ad5217
                              • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                              • Opcode Fuzzy Hash: 25f93c1eb8c7c2b3408b92261e90d72d92bad6cdb28d287bebca9ae006ad5217
                              • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: XPG$XPG
                              • API String ID: 4113138495-1962359302
                              • Opcode ID: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                              • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                              • Opcode Fuzzy Hash: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                              • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                • Part of subcall function 004137AA: RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                              • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                              • Opcode Fuzzy Hash: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                              • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                              • _wcschr.LIBVCRUNTIME ref: 00451ECA
                              • _wcschr.LIBVCRUNTIME ref: 00451ED8
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                              • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                              • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                              • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: p'E$JD
                              • API String ID: 1084509184-908320845
                              • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                              • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                              • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                              • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorInfoLastLocale$_free$_abort
                              • String ID:
                              • API String ID: 2829624132-0
                              • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                              • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                              • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                              • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                              • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                              • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                              • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                              APIs
                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,00433550,00000034,?,?,00000000), ref: 004338DA
                              • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?), ref: 004338F0
                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?,0041E2E2), ref: 00433902
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                              • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                              APIs
                              • OpenClipboard.USER32(00000000), ref: 0040B74C
                              • GetClipboardData.USER32(0000000D), ref: 0040B758
                              • CloseClipboard.USER32 ref: 0040B760
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseDataOpen
                              • String ID:
                              • API String ID: 2058664381-0
                              • Opcode ID: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                              • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                              • Opcode Fuzzy Hash: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                              • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: FeaturePresentProcessor
                              • String ID:
                              • API String ID: 2325560087-3916222277
                              • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                              • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                              • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                              • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: .
                              • API String ID: 0-248832578
                              • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                              • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                              • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                              • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: JD
                              • API String ID: 1084509184-2669065882
                              • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                              • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                              • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                              • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                              • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                              • Opcode Fuzzy Hash: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                              • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                              • HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$FreeProcess
                              • String ID:
                              • API String ID: 3859560861-0
                              • Opcode ID: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                              • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                              • Opcode Fuzzy Hash: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                              • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                              • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                              • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                              • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                              • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                              • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                              • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                              APIs
                              • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                              • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                              • Opcode Fuzzy Hash: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                              • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                              APIs
                                • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                              • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                              • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                              • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                              • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                              • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                              • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                              • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.2 Pro), ref: 0040F920
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                              • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                              • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                              • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                              • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                              • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                              • Instruction Fuzzy Hash:
                              APIs
                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                              • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                              • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                              • DeleteDC.GDI32(00000000), ref: 00418F65
                              • DeleteDC.GDI32(00000000), ref: 00418F68
                              • DeleteObject.GDI32(00000000), ref: 00418F6B
                              • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                              • DeleteDC.GDI32(00000000), ref: 00418F9D
                              • DeleteDC.GDI32(00000000), ref: 00418FA0
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                              • GetIconInfo.USER32(?,?), ref: 00418FF8
                              • DeleteObject.GDI32(?), ref: 00419027
                              • DeleteObject.GDI32(?), ref: 00419034
                              • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                              • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                              • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                              • DeleteDC.GDI32(?), ref: 004191B7
                              • DeleteDC.GDI32(00000000), ref: 004191BA
                              • DeleteObject.GDI32(00000000), ref: 004191BD
                              • GlobalFree.KERNEL32(?), ref: 004191C8
                              • DeleteObject.GDI32(00000000), ref: 0041927C
                              • GlobalFree.KERNEL32(?), ref: 00419283
                              • DeleteDC.GDI32(?), ref: 00419293
                              • DeleteDC.GDI32(00000000), ref: 0041929E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                              • String ID: DISPLAY
                              • API String ID: 479521175-865373369
                              • Opcode ID: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                              • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                              • Opcode Fuzzy Hash: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                              • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                              • GetProcAddress.KERNEL32(00000000), ref: 00418174
                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                              • GetProcAddress.KERNEL32(00000000), ref: 00418188
                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                              • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                              • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                              • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                              • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                              • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                              • ResumeThread.KERNEL32(?), ref: 00418470
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                              • GetCurrentProcess.KERNEL32(?), ref: 00418492
                              • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                              • GetLastError.KERNEL32 ref: 004184B5
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`ou$ntdll
                              • API String ID: 4188446516-1235647125
                              • Opcode ID: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                              • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                              • Opcode Fuzzy Hash: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                              • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                              • ExitProcess.KERNEL32 ref: 0040D80B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                              • API String ID: 1861856835-1447701601
                              • Opcode ID: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                              • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                              • Opcode Fuzzy Hash: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                              • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                              • ExitProcess.KERNEL32 ref: 0040D454
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                              • API String ID: 3797177996-2483056239
                              • Opcode ID: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                              • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                              • Opcode Fuzzy Hash: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                              • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                              • ExitProcess.KERNEL32(00000000), ref: 004124DB
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                              • CloseHandle.KERNEL32(00000000), ref: 00412576
                              • GetCurrentProcessId.KERNEL32 ref: 0041257C
                              • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                              • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                              • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                              • Sleep.KERNEL32(000001F4), ref: 004126BD
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                              • CloseHandle.KERNEL32(00000000), ref: 004126E4
                              • GetCurrentProcessId.KERNEL32 ref: 004126EA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                              • String ID: .exe$8SG$WDH$exepath$open$temp_
                              • API String ID: 2649220323-436679193
                              • Opcode ID: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                              • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                              • Opcode Fuzzy Hash: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                              • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                              • SetEvent.KERNEL32 ref: 0041B2AA
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                              • CloseHandle.KERNEL32 ref: 0041B2CB
                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                              • API String ID: 738084811-2094122233
                              • Opcode ID: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                              • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                              • Opcode Fuzzy Hash: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                              • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                              • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                              • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                              • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$Create
                              • String ID: RIFF$WAVE$data$fmt
                              • API String ID: 1602526932-4212202414
                              • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                              • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                              • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                              • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe,00000001,00407688,C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                              • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                              • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                              • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                              • GetProcAddress.KERNEL32(00000000), ref: 00407308
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                              • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                              • GetProcAddress.KERNEL32(00000000), ref: 00407330
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                              • API String ID: 1646373207-2604999384
                              • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                              • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                              • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                              • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                              APIs
                              • _wcslen.LIBCMT ref: 0040CE42
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                              • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                              • _wcslen.LIBCMT ref: 0040CF21
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                              • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe,00000000,00000000), ref: 0040CFBF
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                              • _wcslen.LIBCMT ref: 0040D001
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                              • ExitProcess.KERNEL32 ref: 0040D09D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe$del$open
                              • API String ID: 1579085052-378245154
                              • Opcode ID: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                              • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                              • Opcode Fuzzy Hash: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                              • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0041C0C7
                              • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                              • lstrlenW.KERNEL32(?), ref: 0041C0F8
                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                              • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                              • _wcslen.LIBCMT ref: 0041C1CC
                              • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                              • GetLastError.KERNEL32 ref: 0041C204
                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                              • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                              • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                              • GetLastError.KERNEL32 ref: 0041C261
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                              • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                              • Opcode Fuzzy Hash: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                              • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                              • LoadLibraryA.KERNEL32(?), ref: 00414E52
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                              • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                              • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                              • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                              • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                              • String ID: EIA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                              • API String ID: 2490988753-3346362794
                              • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                              • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                              • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                              • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                              APIs
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$_wcschr
                              • String ID:
                              • API String ID: 3899193279-0
                              • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                              • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                              • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                              • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                              • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                              • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                              • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                              • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                              • Sleep.KERNEL32(00000064), ref: 00412ECF
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: /stext "$0TG$0TG$NG$NG
                              • API String ID: 1223786279-2576077980
                              • Opcode ID: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                              • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                              • Opcode Fuzzy Hash: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                              • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                              APIs
                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                              • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumOpen
                              • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                              • API String ID: 1332880857-3714951968
                              • Opcode ID: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                              • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                              • Opcode Fuzzy Hash: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                              • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                              APIs
                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                              • GetCursorPos.USER32(?), ref: 0041D67A
                              • SetForegroundWindow.USER32(?), ref: 0041D683
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                              • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                              • ExitProcess.KERNEL32 ref: 0041D6F6
                              • CreatePopupMenu.USER32 ref: 0041D6FC
                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                              • String ID: Close
                              • API String ID: 1657328048-3535843008
                              • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                              • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                              • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                              • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                              APIs
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                              • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                              • Opcode Fuzzy Hash: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                              • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                              • __aulldiv.LIBCMT ref: 00408D88
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                              • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                              • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                              • CloseHandle.KERNEL32(00000000), ref: 00409037
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                              • API String ID: 3086580692-2582957567
                              • Opcode ID: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                              • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                              • Opcode Fuzzy Hash: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                              • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                              APIs
                              • Sleep.KERNEL32(00001388), ref: 0040A77B
                                • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                              • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,00000000,00000000,00000000), ref: 0040A962
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                              • String ID: 8SG$8SG$pQG$pQG$PG$PG
                              • API String ID: 3795512280-1152054767
                              • Opcode ID: ff793148450d5445b41cee081077762d1b1ae7bc4452be26425da9ad383290d3
                              • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                              • Opcode Fuzzy Hash: ff793148450d5445b41cee081077762d1b1ae7bc4452be26425da9ad383290d3
                              • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                              APIs
                              • connect.WS2_32(?,?,?), ref: 004048E0
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                              • WSAGetLastError.WS2_32 ref: 00404A21
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-3229884001
                              • Opcode ID: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                              • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                              • Opcode Fuzzy Hash: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                              • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 0045138A
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                              • _free.LIBCMT ref: 0045137F
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 004513A1
                              • _free.LIBCMT ref: 004513B6
                              • _free.LIBCMT ref: 004513C1
                              • _free.LIBCMT ref: 004513E3
                              • _free.LIBCMT ref: 004513F6
                              • _free.LIBCMT ref: 00451404
                              • _free.LIBCMT ref: 0045140F
                              • _free.LIBCMT ref: 00451447
                              • _free.LIBCMT ref: 0045144E
                              • _free.LIBCMT ref: 0045146B
                              • _free.LIBCMT ref: 00451483
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                              • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                              • ExitProcess.KERNEL32 ref: 0040D9FF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                              • API String ID: 1913171305-3159800282
                              • Opcode ID: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                              • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                              • Opcode Fuzzy Hash: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                              • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                              APIs
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                              • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                              • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                              • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                              APIs
                                • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                              • GetLastError.KERNEL32 ref: 00455D6F
                              • __dosmaperr.LIBCMT ref: 00455D76
                              • GetFileType.KERNEL32(00000000), ref: 00455D82
                              • GetLastError.KERNEL32 ref: 00455D8C
                              • __dosmaperr.LIBCMT ref: 00455D95
                              • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                              • CloseHandle.KERNEL32(?), ref: 00455EFF
                              • GetLastError.KERNEL32 ref: 00455F31
                              • __dosmaperr.LIBCMT ref: 00455F38
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                              • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                              • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                              • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,tC,0043EA74,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006), ref: 0044AD23
                              • __alloca_probe_16.LIBCMT ref: 0044AD5B
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006,?,?,?), ref: 0044ADA9
                              • __alloca_probe_16.LIBCMT ref: 0044AE40
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,A4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                              • __freea.LIBCMT ref: 0044AEB0
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • __freea.LIBCMT ref: 0044AEB9
                              • __freea.LIBCMT ref: 0044AEDE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                              • String ID: PkGNG$tC
                              • API String ID: 3864826663-4196309852
                              • Opcode ID: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                              • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                              • Opcode Fuzzy Hash: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                              • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: \&G$\&G$`&G
                              • API String ID: 269201875-253610517
                              • Opcode ID: f361c4fdd0f35bb0b590f5a399794b5d5c57f6d7c3c5bbd0b76040d27d65b4a3
                              • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                              • Opcode Fuzzy Hash: f361c4fdd0f35bb0b590f5a399794b5d5c57f6d7c3c5bbd0b76040d27d65b4a3
                              • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                              • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                              • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                              • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040AD73
                              • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                              • GetForegroundWindow.USER32 ref: 0040AD84
                              • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                              • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for $ minutes }$]
                              • API String ID: 911427763-3954389425
                              • Opcode ID: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                              • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                              • Opcode Fuzzy Hash: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                              • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                              APIs
                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                              • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                              • Opcode Fuzzy Hash: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                              • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                              • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                              • __dosmaperr.LIBCMT ref: 0043A926
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                              • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                              • __dosmaperr.LIBCMT ref: 0043A963
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                              • __dosmaperr.LIBCMT ref: 0043A9B7
                              • _free.LIBCMT ref: 0043A9C3
                              • _free.LIBCMT ref: 0043A9CA
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                              • String ID:
                              • API String ID: 2441525078-0
                              • Opcode ID: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                              • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                              • Opcode Fuzzy Hash: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                              • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 004054BF
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                              • TranslateMessage.USER32(?), ref: 0040557E
                              • DispatchMessageA.USER32(?), ref: 00405589
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: 92a42e6f76523c23ad071d277faa5832b5c30b25a00b0af7c670b91f71b4b998
                              • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                              • Opcode Fuzzy Hash: 92a42e6f76523c23ad071d277faa5832b5c30b25a00b0af7c670b91f71b4b998
                              • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                              APIs
                                • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                              • CloseHandle.KERNEL32(00000000), ref: 00417E20
                              • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                              • String ID: 0VG$0VG$<$@$Temp
                              • API String ID: 1704390241-2575729100
                              • Opcode ID: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                              • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                              • Opcode Fuzzy Hash: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                              • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                              APIs
                              • OpenClipboard.USER32 ref: 0041697C
                              • EmptyClipboard.USER32 ref: 0041698A
                              • CloseClipboard.USER32 ref: 00416990
                              • OpenClipboard.USER32 ref: 00416997
                              • GetClipboardData.USER32(0000000D), ref: 004169A7
                              • GlobalLock.KERNEL32(00000000), ref: 004169B0
                              • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                              • CloseClipboard.USER32 ref: 004169BF
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                              • String ID: !D@
                              • API String ID: 2172192267-604454484
                              • Opcode ID: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                              • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                              • Opcode Fuzzy Hash: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                              • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                              APIs
                              • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                              • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                              • CloseHandle.KERNEL32(00000000), ref: 0041349A
                              • CloseHandle.KERNEL32(?), ref: 004134A0
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                              • String ID:
                              • API String ID: 297527592-0
                              • Opcode ID: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                              • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                              • Opcode Fuzzy Hash: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                              • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                              • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                              • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                              • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                              APIs
                              • _free.LIBCMT ref: 004481B5
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 004481C1
                              • _free.LIBCMT ref: 004481CC
                              • _free.LIBCMT ref: 004481D7
                              • _free.LIBCMT ref: 004481E2
                              • _free.LIBCMT ref: 004481ED
                              • _free.LIBCMT ref: 004481F8
                              • _free.LIBCMT ref: 00448203
                              • _free.LIBCMT ref: 0044820E
                              • _free.LIBCMT ref: 0044821C
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                              • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                              • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                              • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                              • API String ID: 3578746661-3604713145
                              • Opcode ID: a7da0e03d27dfd4f061563b37853281ba9d59ca7803a508e71efe6cf15854c11
                              • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                              • Opcode Fuzzy Hash: a7da0e03d27dfd4f061563b37853281ba9d59ca7803a508e71efe6cf15854c11
                              • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                              APIs
                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: DecodePointer
                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                              • API String ID: 3527080286-3064271455
                              • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                              • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                              • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                              • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                              APIs
                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                              • __fassign.LIBCMT ref: 0044B4F9
                              • __fassign.LIBCMT ref: 0044B514
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B559
                              • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B592
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID: PkGNG
                              • API String ID: 1324828854-263838557
                              • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                              • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                              • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                              • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • Sleep.KERNEL32(00000064), ref: 0041755C
                              • DeleteFileW.KERNEL32(00000000), ref: 00417590
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                              • API String ID: 1462127192-2001430897
                              • Opcode ID: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                              • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                              • Opcode Fuzzy Hash: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                              • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                              APIs
                              • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                              • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe), ref: 004074D9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentProcess
                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                              • API String ID: 2050909247-4242073005
                              • Opcode ID: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                              • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                              • Opcode Fuzzy Hash: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                              • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                              APIs
                              • _strftime.LIBCMT ref: 00401D50
                                • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                              • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                              • API String ID: 3809562944-243156785
                              • Opcode ID: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                              • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                              • Opcode Fuzzy Hash: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                              • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                              • int.LIBCPMT ref: 00410EBC
                                • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                              • std::_Facet_Register.LIBCPMT ref: 00410EFC
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                              • __Init_thread_footer.LIBCMT ref: 00410F64
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                              • String ID: ,kG$0kG
                              • API String ID: 3815856325-2015055088
                              • Opcode ID: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                              • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                              • Opcode Fuzzy Hash: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                              • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                              • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                              • waveInStart.WINMM ref: 00401CFE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: dMG$|MG$PG
                              • API String ID: 1356121797-532278878
                              • Opcode ID: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                              • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                              • Opcode Fuzzy Hash: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                              • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                              • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                              • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                              • TranslateMessage.USER32(?), ref: 0041D57A
                              • DispatchMessageA.USER32(?), ref: 0041D584
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID: Remcos
                              • API String ID: 1970332568-165870891
                              • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                              • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                              • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                              • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                              • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                              • Opcode Fuzzy Hash: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                              • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                              APIs
                              • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                              • __alloca_probe_16.LIBCMT ref: 00453F6A
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                              • __alloca_probe_16.LIBCMT ref: 00454014
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                              • __freea.LIBCMT ref: 00454083
                              • __freea.LIBCMT ref: 0045408F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 201697637-0
                              • Opcode ID: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                              • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                              • Opcode Fuzzy Hash: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                              • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • _memcmp.LIBVCRUNTIME ref: 004454A4
                              • _free.LIBCMT ref: 00445515
                              • _free.LIBCMT ref: 0044552E
                              • _free.LIBCMT ref: 00445560
                              • _free.LIBCMT ref: 00445569
                              • _free.LIBCMT ref: 00445575
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                              • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                              • Opcode Fuzzy Hash: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                              • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: tcp$udp
                              • API String ID: 0-3725065008
                              • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                              • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                              • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                              • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004018BE
                              • ExitThread.KERNEL32 ref: 004018F6
                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                              • String ID: PkG$XMG$NG$NG
                              • API String ID: 1649129571-3151166067
                              • Opcode ID: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                              • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                              • Opcode Fuzzy Hash: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                              • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                              • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID: .part
                              • API String ID: 1303771098-3499674018
                              • Opcode ID: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                              • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                              • Opcode Fuzzy Hash: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                              • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                              APIs
                              • SendInput.USER32 ref: 00419A25
                              • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                              • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: InputSend$Virtual
                              • String ID:
                              • API String ID: 1167301434-0
                              • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                              • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                              • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                              • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: __freea$__alloca_probe_16_free
                              • String ID: a/p$am/pm$h{D
                              • API String ID: 2936374016-2303565833
                              • Opcode ID: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                              • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                              • Opcode Fuzzy Hash: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                              • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                              APIs
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • _free.LIBCMT ref: 00444E87
                              • _free.LIBCMT ref: 00444E9E
                              • _free.LIBCMT ref: 00444EBD
                              • _free.LIBCMT ref: 00444ED8
                              • _free.LIBCMT ref: 00444EEF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocateHeap
                              • String ID: KED
                              • API String ID: 3033488037-2133951994
                              • Opcode ID: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                              • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                              • Opcode Fuzzy Hash: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                              • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                              • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: [regsplt]$xUG$TG
                              • API String ID: 3554306468-1165877943
                              • Opcode ID: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                              • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                              • Opcode Fuzzy Hash: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                              • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: xUG$NG$NG$TG
                              • API String ID: 3114080316-2811732169
                              • Opcode ID: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                              • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                              • Opcode Fuzzy Hash: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                              • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F918,?,00000000,?,00000001,?,000000FF,00000001,0043F918,?), ref: 004511F9
                              • __alloca_probe_16.LIBCMT ref: 00451231
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451282
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451294
                              • __freea.LIBCMT ref: 0045129D
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                              • String ID: PkGNG
                              • API String ID: 313313983-263838557
                              • Opcode ID: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                              • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                              • Opcode Fuzzy Hash: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                              • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                              APIs
                                • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                              • _wcslen.LIBCMT ref: 0041B7F4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                              • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                              • API String ID: 37874593-122982132
                              • Opcode ID: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                              • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                              • Opcode Fuzzy Hash: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                              • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                              APIs
                                • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                              • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                              • API String ID: 1133728706-4073444585
                              • Opcode ID: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                              • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                              • Opcode Fuzzy Hash: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                              • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                              • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                              • Opcode Fuzzy Hash: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                              • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                              APIs
                                • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                              • _free.LIBCMT ref: 00450FC8
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00450FD3
                              • _free.LIBCMT ref: 00450FDE
                              • _free.LIBCMT ref: 00451032
                              • _free.LIBCMT ref: 0045103D
                              • _free.LIBCMT ref: 00451048
                              • _free.LIBCMT ref: 00451053
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                              • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                              • int.LIBCPMT ref: 004111BE
                                • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                              • std::_Facet_Register.LIBCPMT ref: 004111FE
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: (mG
                              • API String ID: 2536120697-4059303827
                              • Opcode ID: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                              • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                              • Opcode Fuzzy Hash: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                              • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                              APIs
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                              • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue
                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 1866151309-2070987746
                              • Opcode ID: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                              • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                              • Opcode Fuzzy Hash: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                              • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                              APIs
                              • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                              • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                              • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                              • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                              • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe), ref: 0040760B
                                • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                              • CoUninitialize.OLE32 ref: 00407664
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                              • API String ID: 3851391207-1778716826
                              • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                              • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                              • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                              • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                              • GetLastError.KERNEL32 ref: 0040BB22
                              Strings
                              • [Chrome Cookies not found], xrefs: 0040BB3C
                              • UserProfile, xrefs: 0040BAE8
                              • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                              • API String ID: 2018770650-304995407
                              • Opcode ID: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                              • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                              • Opcode Fuzzy Hash: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                              • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                              APIs
                              • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                              • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AllocOutputShowWindow
                              • String ID: Remcos v$5.1.2 Pro$CONOUT$
                              • API String ID: 2425139147-1584637518
                              • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                              • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                              • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                              • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002), ref: 004433FA
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                              • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG), ref: 00443430
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$PkGNG$mscoree.dll
                              • API String ID: 4061214504-213444651
                              • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                              • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                              • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                              • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                              APIs
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                              • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                              • Sleep.KERNEL32(00002710), ref: 0041AE98
                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: PlaySound$HandleLocalModuleSleepTime
                              • String ID: Alarm triggered$`ou
                              • API String ID: 614609389-1879314875
                              • Opcode ID: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                              • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                              • Opcode Fuzzy Hash: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                              • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                              APIs
                              • __allrem.LIBCMT ref: 0043ACE9
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                              • __allrem.LIBCMT ref: 0043AD1C
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                              • __allrem.LIBCMT ref: 0043AD51
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                              • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                              • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                              • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                              APIs
                              • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                              • API String ID: 3469354165-3054508432
                              • Opcode ID: 320c67068b3b288db2e993e88ff11ad854d39230f6bbd9045a2096c25c2dffa0
                              • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                              • Opcode Fuzzy Hash: 320c67068b3b288db2e993e88ff11ad854d39230f6bbd9045a2096c25c2dffa0
                              • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                              APIs
                                • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                              • SetLastError.KERNEL32(000000C1,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                              • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,00000000), ref: 00411E04
                                • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00411CEE
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,00000000), ref: 00411E4B
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411E52
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411F65
                                • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                              • String ID:
                              • API String ID: 3950776272-0
                              • Opcode ID: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                              • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                              • Opcode Fuzzy Hash: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                              • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                              APIs
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 30f97a14dd6f87c9245b8e0b778041a74f07a421c1ac77e9beff42b74887127b
                              • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                              • Opcode Fuzzy Hash: 30f97a14dd6f87c9245b8e0b778041a74f07a421c1ac77e9beff42b74887127b
                              • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                              • String ID:
                              • API String ID: 493672254-0
                              • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                              • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                              • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                              • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID: PkGNG
                              • API String ID: 1036877536-263838557
                              • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                              • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                              • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                              • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                              APIs
                              • GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                              • _free.LIBCMT ref: 004482CC
                              • _free.LIBCMT ref: 004482F4
                              • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                              • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                              • _abort.LIBCMT ref: 00448313
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                              • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                              • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                              • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                              • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                              • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                              • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                              • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                              • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                              • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                              • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                              • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                              • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: PkGNG
                              • API String ID: 0-263838557
                              • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                              • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                              • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                              • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                              • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                              • CloseHandle.KERNEL32(?), ref: 00404DDB
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                              • String ID: PkGNG
                              • API String ID: 3360349984-263838557
                              • Opcode ID: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                              • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                              • Opcode Fuzzy Hash: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                              • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                              APIs
                              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                              • wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                              • API String ID: 1497725170-248792730
                              • Opcode ID: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                              • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                              • Opcode Fuzzy Hash: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                              • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                              • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                              • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSizeSleep
                              • String ID: XQG
                              • API String ID: 1958988193-3606453820
                              • Opcode ID: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                              • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                              • Opcode Fuzzy Hash: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                              • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                              • GetLastError.KERNEL32 ref: 0041D611
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                              • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                              • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                              • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                              APIs
                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                              • CloseHandle.KERNEL32(?), ref: 004077E5
                              • CloseHandle.KERNEL32(?), ref: 004077EA
                              Strings
                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                              • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreateProcess
                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                              • API String ID: 2922976086-4183131282
                              • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                              • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                              • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                              • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                              Strings
                              • SG, xrefs: 00407715
                              • C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe, xrefs: 004076FF
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: SG$C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                              • API String ID: 0-4220682021
                              • Opcode ID: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                              • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                              • Opcode Fuzzy Hash: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                              • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                              • SetEvent.KERNEL32(?), ref: 0040512C
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                              • CloseHandle.KERNEL32(?), ref: 00405140
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID: KeepAlive | Disabled
                              • API String ID: 2993684571-305739064
                              • Opcode ID: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                              • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                              • Opcode Fuzzy Hash: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                              • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                              Strings
                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                              • API String ID: 3024135584-2418719853
                              • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                              • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                              • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                              • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                              APIs
                              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                              • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetCursorInfo$User32.dll$`ou
                              • API String ID: 1646373207-4165041016
                              • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                              • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                              • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                              • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                              • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                              • Opcode Fuzzy Hash: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                              • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                              APIs
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                              • _free.LIBCMT ref: 0044943D
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00449609
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                              • String ID:
                              • API String ID: 1286116820-0
                              • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                              • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                              • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                              • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                              APIs
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                              • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID:
                              • API String ID: 4269425633-0
                              • Opcode ID: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                              • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                              • Opcode Fuzzy Hash: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                              • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                              APIs
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                              • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                              • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                              • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                              • _free.LIBCMT ref: 0044F43F
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                              • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                              • Opcode Fuzzy Hash: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                              • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                              APIs
                              • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4DE
                              • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4EA
                              • WriteFile.KERNEL32(00000000,00000000,00000000,00406FC0,00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4FB
                              • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C508
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreatePointerWrite
                              • String ID:
                              • API String ID: 1852769593-0
                              • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                              • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                              • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                              • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                              APIs
                              • GetLastError.KERNEL32(?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044831E
                              • _free.LIBCMT ref: 00448353
                              • _free.LIBCMT ref: 0044837A
                              • SetLastError.KERNEL32(00000000), ref: 00448387
                              • SetLastError.KERNEL32(00000000), ref: 00448390
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                              • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                              • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                              • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                              APIs
                              • _free.LIBCMT ref: 00450A54
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00450A66
                              • _free.LIBCMT ref: 00450A78
                              • _free.LIBCMT ref: 00450A8A
                              • _free.LIBCMT ref: 00450A9C
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                              • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                              APIs
                              • _free.LIBCMT ref: 00444106
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00444118
                              • _free.LIBCMT ref: 0044412B
                              • _free.LIBCMT ref: 0044413C
                              • _free.LIBCMT ref: 0044414D
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                              • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: PkGNG
                              • API String ID: 0-263838557
                              • Opcode ID: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                              • Instruction ID: da8fb74aa53f7b39327717419ea6793f6800af9799f3d5c2cf6102f7e15971fb
                              • Opcode Fuzzy Hash: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                              • Instruction Fuzzy Hash: 1451C171D00209AAEF109FA5D885BAFBBB8EF45314F14015FE905A7291CB38D911CBA9
                              APIs
                              • _strpbrk.LIBCMT ref: 0044E7B8
                              • _free.LIBCMT ref: 0044E8D5
                                • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,?,?,?,?,?,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD8C
                                • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000), ref: 0043BD93
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                              • String ID: *?$.
                              • API String ID: 2812119850-3972193922
                              • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                              • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                              • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                              • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountEventTick
                              • String ID: !D@$NG
                              • API String ID: 180926312-2721294649
                              • Opcode ID: 1409f91683eb0d13268e59a75ed27cf67ebd121d06af2735119167055e625867
                              • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                              • Opcode Fuzzy Hash: 1409f91683eb0d13268e59a75ed27cf67ebd121d06af2735119167055e625867
                              • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                              APIs
                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFileKeyboardLayoutNameconnectsend
                              • String ID: XQG$NG$PG
                              • API String ID: 1634807452-3565412412
                              • Opcode ID: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                              • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                              • Opcode Fuzzy Hash: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                              • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe,00000104), ref: 00443515
                              • _free.LIBCMT ref: 004435E0
                              • _free.LIBCMT ref: 004435EA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\AppData\Roaming\OlhQyptevOgDP.exe
                              • API String ID: 2506810119-2129193180
                              • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                              • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                              • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                              • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                              APIs
                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BBFE,?,00000000,FF8BC35D), ref: 0044B952
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B980
                              • GetLastError.KERNEL32 ref: 0044B9B1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorFileLastMultiWideWrite
                              • String ID: PkGNG
                              • API String ID: 2456169464-263838557
                              • Opcode ID: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                              • Instruction ID: 31ac96f82a5847659344ef20b41dc67af7a50504b34fbd786f6314a6cc22fa3b
                              • Opcode Fuzzy Hash: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                              • Instruction Fuzzy Hash: B13161B5A102199FDB14CF59DD819EAB7B9FB08305F0444BEE90AD7251D734ED80CBA4
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: /sort "Visit Time" /stext "$0NG
                              • API String ID: 368326130-3219657780
                              • Opcode ID: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                              • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                              • Opcode Fuzzy Hash: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                              • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                              APIs
                              • _wcslen.LIBCMT ref: 00416330
                                • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen$CloseCreateValue
                              • String ID: !D@$okmode$PG
                              • API String ID: 3411444782-3370592832
                              • Opcode ID: 33c7808d8a7b0bded71eafecf17113fbf2925580b38271ada3cd576753f1e43b
                              • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                              • Opcode Fuzzy Hash: 33c7808d8a7b0bded71eafecf17113fbf2925580b38271ada3cd576753f1e43b
                              • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                              APIs
                                • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                              Strings
                              • User Data\Default\Network\Cookies, xrefs: 0040C63E
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                              • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                              • Opcode Fuzzy Hash: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                              • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                              APIs
                                • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                              Strings
                              • User Data\Default\Network\Cookies, xrefs: 0040C70D
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                              • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                              • Opcode Fuzzy Hash: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                              • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,0040A2B8,004750F0,00000000,00000000), ref: 0040A239
                              • CreateThread.KERNEL32(00000000,00000000,0040A2A2,004750F0,00000000,00000000), ref: 0040A249
                              • CreateThread.KERNEL32(00000000,00000000,0040A2C4,004750F0,00000000,00000000), ref: 0040A255
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTimewsprintf
                              • String ID: Offline Keylogger Started
                              • API String ID: 465354869-4114347211
                              • Opcode ID: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                              • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                              • Opcode Fuzzy Hash: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                              • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                              APIs
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040AFA9
                              • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040AFB5
                              • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTime$wsprintf
                              • String ID: Online Keylogger Started
                              • API String ID: 112202259-1258561607
                              • Opcode ID: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                              • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                              • Opcode Fuzzy Hash: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                              • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                              APIs
                              • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                              • API String ID: 481472006-3277280411
                              • Opcode ID: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                              • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                              • Opcode Fuzzy Hash: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                              • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00404F81
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                              • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                              • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                              • Opcode Fuzzy Hash: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                              • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                              APIs
                              • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                              • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: CryptUnprotectData$crypt32
                              • API String ID: 2574300362-2380590389
                              • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                              • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                              • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                              • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                              APIs
                              • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C382,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C30C
                              • GetLastError.KERNEL32 ref: 0044C316
                              • __dosmaperr.LIBCMT ref: 0044C31D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastPointer__dosmaperr
                              • String ID: PkGNG
                              • API String ID: 2336955059-263838557
                              • Opcode ID: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                              • Instruction ID: 8193a85edd99f1e073baf55791db2896ff72ac9ff19ac05387a69161c0de0417
                              • Opcode Fuzzy Hash: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                              • Instruction Fuzzy Hash: FB019032A11108BBDB01DFDDDC4586E7B19EB81320B28034EFD2097280EAB4DD119794
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                              • CloseHandle.KERNEL32(?), ref: 004051CA
                              • SetEvent.KERNEL32(?), ref: 004051D9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandleObjectSingleWait
                              • String ID: Connection Timeout
                              • API String ID: 2055531096-499159329
                              • Opcode ID: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                              • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                              • Opcode Fuzzy Hash: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                              • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8Throw
                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                              • API String ID: 2005118841-1866435925
                              • Opcode ID: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                              • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                              • Opcode Fuzzy Hash: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                              • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                              APIs
                              • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB9A
                              • LocalFree.KERNEL32(?,?), ref: 0041CBC0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: FormatFreeLocalMessage
                              • String ID: @J@$PkGNG
                              • API String ID: 1427518018-1416487119
                              • Opcode ID: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                              • Instruction ID: 923000db8f6a2d31ebee0df48ef62036c6bc2ff20d3f060cbaedccf048ea6ec3
                              • Opcode Fuzzy Hash: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                              • Instruction Fuzzy Hash: 34F0A930B00219A6DF14A766DC4ADFF772DDB44305B10407FB605B21D1DE785D059659
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041385A
                              • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,756F37E0,?), ref: 00413888
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,756F37E0,?,?,?,?,?,0040CFE5,?,00000000), ref: 00413893
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413858
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 1818849710-1051519024
                              • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                              • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                              • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                              • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                              • String ID: bad locale name
                              • API String ID: 3628047217-1405518554
                              • Opcode ID: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                              • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                              • Opcode Fuzzy Hash: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                              • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                              • RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                              • RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Control Panel\Desktop
                              • API String ID: 1818849710-27424756
                              • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                              • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                              • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                              • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                              • ShowWindow.USER32(00000009), ref: 00416C9C
                              • SetForegroundWindow.USER32 ref: 00416CA8
                                • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                              • String ID: !D@
                              • API String ID: 3446828153-604454484
                              • Opcode ID: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                              • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                              • Opcode Fuzzy Hash: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                              • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: /C $cmd.exe$open
                              • API String ID: 587946157-3896048727
                              • Opcode ID: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                              • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                              • Opcode Fuzzy Hash: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                              • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                              APIs
                              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                              • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetLastInputInfo$User32.dll
                              • API String ID: 2574300362-1519888992
                              • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                              • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                              • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                              • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                              APIs
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                              • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                              • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                              • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                              APIs
                              Strings
                              • Cleared browsers logins and cookies., xrefs: 0040C130
                              • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                              • API String ID: 3472027048-1236744412
                              • Opcode ID: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                              • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                              • Opcode Fuzzy Hash: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                              • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                              APIs
                                • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                              • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                              • Sleep.KERNEL32(00000064), ref: 0040A638
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$ForegroundLength
                              • String ID: [ $ ]
                              • API String ID: 3309952895-93608704
                              • Opcode ID: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                              • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                              • Opcode Fuzzy Hash: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                              • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                              • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                              • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                              • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                              • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                              • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                              • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                              • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C543
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C568
                              • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E84), ref: 0041C576
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                              • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                              • Opcode Fuzzy Hash: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                              • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleOpenProcess
                              • String ID:
                              • API String ID: 39102293-0
                              • Opcode ID: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                              • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                              • Opcode Fuzzy Hash: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                              • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                              • _UnwindNestedFrames.LIBCMT ref: 00439911
                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                              • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID:
                              • API String ID: 2633735394-0
                              • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                              • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                              APIs
                              • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                              • GetSystemMetrics.USER32(0000004D), ref: 00419431
                              • GetSystemMetrics.USER32(0000004E), ref: 00419437
                              • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                              • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                              APIs
                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 1761009282-0
                              • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                              • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHandling__start
                              • String ID: pow
                              • API String ID: 3213639722-2276729525
                              • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                              • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                              • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                              • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                              APIs
                              • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F8F
                              • GetLastError.KERNEL32 ref: 00449FAB
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide
                              • String ID: PkGNG
                              • API String ID: 203985260-263838557
                              • Opcode ID: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                              • Instruction ID: e4919e29a80df6b7ced925805d10dfcffaa1b378e184719e11b938f1b8f94c7b
                              • Opcode Fuzzy Hash: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                              • Instruction Fuzzy Hash: 2331E430200201ABFB21EF56C845BAB7768EF45721F15016BF815C7391DB38CD45E7A9
                              APIs
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • __Init_thread_footer.LIBCMT ref: 0040B7D2
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: [End of clipboard]$[Text copied to clipboard]
                              • API String ID: 1881088180-3686566968
                              • Opcode ID: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                              • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                              • Opcode Fuzzy Hash: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                              • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                              • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                              • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                              • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BBEE,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B85B
                              • GetLastError.KERNEL32 ref: 0044B884
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: PkGNG
                              • API String ID: 442123175-263838557
                              • Opcode ID: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                              • Instruction ID: 9972a58bdd01e134d13becd973f3089a2f7b3635eb9ddb95e5d59f4384582b5e
                              • Opcode Fuzzy Hash: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                              • Instruction Fuzzy Hash: B2316F31A00619DBCB24DF59DD8099AF3F9FF48301B1485AAE909D7261E734ED81CBA8
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BC0E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B76D
                              • GetLastError.KERNEL32 ref: 0044B796
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: PkGNG
                              • API String ID: 442123175-263838557
                              • Opcode ID: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                              • Instruction ID: c865f2f287ade0309940dd9d446f9ab1351fd896516eb6f8948e0fb5ca6ebdce
                              • Opcode Fuzzy Hash: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                              • Instruction Fuzzy Hash: 69219435600219DFDB14CF69D980BEAB3F9EB48312F1048AAE94AD7251D734ED85CB64
                              APIs
                              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                              • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                              • Opcode Fuzzy Hash: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                              • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                              APIs
                              • Sleep.KERNEL32 ref: 0041667B
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadFileSleep
                              • String ID: !D@
                              • API String ID: 1931167962-604454484
                              • Opcode ID: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                              • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                              • Opcode Fuzzy Hash: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                              • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: alarm.wav$hYG
                              • API String ID: 1174141254-2782910960
                              • Opcode ID: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                              • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                              • Opcode Fuzzy Hash: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                              • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                              APIs
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • CloseHandle.KERNEL32(?), ref: 0040B0EF
                              • UnhookWindowsHookEx.USER32 ref: 0040B102
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                              • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                              • Opcode Fuzzy Hash: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                              • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                              APIs
                              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,A4E85006,00000001,?,0043CEA5), ref: 00448CA4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: String
                              • String ID: LCMapStringEx$PkGNG
                              • API String ID: 2568140703-1065776982
                              • Opcode ID: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                              • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                              • Opcode Fuzzy Hash: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                              • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                              APIs
                              • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                              • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: XMG
                              • API String ID: 2315374483-813777761
                              • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                              • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                              • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                              • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                              APIs
                              • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocaleValid
                              • String ID: IsValidLocaleName$kKD
                              • API String ID: 1901932003-3269126172
                              • Opcode ID: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                              • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                              • Opcode Fuzzy Hash: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                              • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Google\Chrome\
                              • API String ID: 1174141254-4188645398
                              • Opcode ID: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                              • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                              • Opcode Fuzzy Hash: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                              • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                              • API String ID: 1174141254-2800177040
                              • Opcode ID: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                              • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                              • Opcode Fuzzy Hash: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                              • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: AppData$\Opera Software\Opera Stable\
                              • API String ID: 1174141254-1629609700
                              • Opcode ID: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                              • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                              • Opcode Fuzzy Hash: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                              • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                              APIs
                              • GetKeyState.USER32(00000011), ref: 0040B686
                                • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                              • String ID: [AltL]$[AltR]
                              • API String ID: 2738857842-2658077756
                              • Opcode ID: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                              • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                              • Opcode Fuzzy Hash: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                              • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Time$FileSystem
                              • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                              • API String ID: 2086374402-949981407
                              • Opcode ID: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                              • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                              • Opcode Fuzzy Hash: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                              • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: !D@$open
                              • API String ID: 587946157-1586967515
                              • Opcode ID: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                              • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                              • Opcode Fuzzy Hash: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                              • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                              APIs
                              • ___initconout.LIBCMT ref: 004555DB
                                • Part of subcall function 00456B9D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004555E0,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000), ref: 00456BB0
                              • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB99,?), ref: 004555FE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ConsoleCreateFileWrite___initconout
                              • String ID: PkGNG
                              • API String ID: 3087715906-263838557
                              • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                              • Instruction ID: 53f4b2898eb153bde3bf118a85e4039abf363423ff24ad7888d91dc13aa78fd6
                              • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                              • Instruction Fuzzy Hash: C5E0EDB0100548BBDA208B69DC29EBA3328EB00331F500369FE29C62D2EB34EC44C769
                              APIs
                              • GetKeyState.USER32(00000012), ref: 0040B6E0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: State
                              • String ID: [CtrlL]$[CtrlR]
                              • API String ID: 1649606143-2446555240
                              • Opcode ID: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                              • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                              • Opcode Fuzzy Hash: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                              • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                              APIs
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • __Init_thread_footer.LIBCMT ref: 00410F64
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: ,kG$0kG
                              • API String ID: 1881088180-2015055088
                              • Opcode ID: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                              • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                              • Opcode Fuzzy Hash: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                              • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D509,00000000,?,00000000), ref: 00413A6C
                              • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A80
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteOpenValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 2654517830-1051519024
                              • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                              • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                              • GetLastError.KERNEL32 ref: 00440D85
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                              • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                              • Opcode Fuzzy Hash: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                              • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                              APIs
                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                              • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411CB5
                              • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                              Memory Dump Source
                              • Source File: 0000000C.00000002.1577311727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_400000_OlhQyptevOgDP.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastRead
                              • String ID:
                              • API String ID: 4100373531-0
                              • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                              • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                              • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                              • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99