Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MT103 CIBC Ref No EBOTT40930537914.exe

Overview

General Information

Sample name:MT103 CIBC Ref No EBOTT40930537914.exe
(renamed file extension from pif to exe)
Original sample name:MT103 CIBC Ref No EBOTT40930537914.pif
Analysis ID:1529365
MD5:3c228f541d5f99e928fc4f9a0993f45c
SHA1:ff3e24330aae208fe5c11ff45a2d913c683e55d9
SHA256:918b9e2ab61a0ef85ed819b7ed4886f3fe23d34059cb87003fc8d73195e5d438
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • MT103 CIBC Ref No EBOTT40930537914.exe (PID: 1004 cmdline: "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe" MD5: 3C228F541D5F99E928FC4F9A0993F45C)
    • powershell.exe (PID: 4444 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4488 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7460 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 344 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • pvTSOIBBT.exe (PID: 7424 cmdline: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe MD5: 3C228F541D5F99E928FC4F9A0993F45C)
    • schtasks.exe (PID: 7600 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • pvTSOIBBT.exe (PID: 7652 cmdline: "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe" MD5: 3C228F541D5F99E928FC4F9A0993F45C)
    • pvTSOIBBT.exe (PID: 7660 cmdline: "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe" MD5: 3C228F541D5F99E928FC4F9A0993F45C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "milliondollar23.duckdns.org:3984:1", "Assigned name": "GMAlL-TARGET", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-3XAFQF", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.4140725922.00000000033EF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000E.00000002.1753117489.0000000000E07000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 19 entries
              SourceRuleDescriptionAuthorStrings
              0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x690b8:$a1: Remcos restarted by watchdog!
                    • 0x69630:$a3: %02i:%02i:%02i:%03i
                    0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x6310c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x63088:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x63088:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x63588:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x63db8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x6317c:$str_b2: Executing file:
                    • 0x641fc:$str_b3: GetDirectListeningPort
                    • 0x63ba8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x63d28:$str_b7: \update.vbs
                    • 0x631a4:$str_b9: Downloaded file:
                    • 0x63190:$str_b10: Downloading file:
                    • 0x63234:$str_b12: Failed to upload file:
                    • 0x641c4:$str_b13: StartForward
                    • 0x641e4:$str_b14: StopForward
                    • 0x63c80:$str_b15: fso.DeleteFile "
                    • 0x63c14:$str_b16: On Error Resume Next
                    • 0x63cb0:$str_b17: fso.DeleteFolder "
                    • 0x63224:$str_b18: Uploaded file:
                    • 0x631e4:$str_b19: Unable to delete:
                    • 0x63c48:$str_b20: while fso.FileExists("
                    • 0x636c1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 29 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ParentImage: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe, ParentProcessId: 1004, ParentProcessName: MT103 CIBC Ref No EBOTT40930537914.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ProcessId: 4444, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ParentImage: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe, ParentProcessId: 1004, ParentProcessName: MT103 CIBC Ref No EBOTT40930537914.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ProcessId: 4444, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe, ParentImage: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe, ParentProcessId: 7424, ParentProcessName: pvTSOIBBT.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp", ProcessId: 7600, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ParentImage: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe, ParentProcessId: 1004, ParentProcessName: MT103 CIBC Ref No EBOTT40930537914.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp", ProcessId: 344, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ParentImage: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe, ParentProcessId: 1004, ParentProcessName: MT103 CIBC Ref No EBOTT40930537914.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ProcessId: 4444, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe", ParentImage: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe, ParentProcessId: 1004, ParentProcessName: MT103 CIBC Ref No EBOTT40930537914.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp", ProcessId: 344, ProcessName: schtasks.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe, ProcessId: 7288, TargetFilename: C:\ProgramData\remcos\logs.dat
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T22:43:31.766362+020020365941Malware Command and Control Activity Detected192.168.2.449733176.9.23.583984TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T22:43:33.255199+020028033043Unknown Traffic192.168.2.449734178.237.33.5080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeAvira: detection malicious, Label: HEUR/AGEN.1309290
                    Source: 0000000E.00000002.1753117489.0000000000E07000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "milliondollar23.duckdns.org:3984:1", "Assigned name": "GMAlL-TARGET", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-3XAFQF", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4140725922.00000000033EF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1753117489.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 7288, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeJoe Sandbox ML: detected
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,14_2_004338C8
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_491dd935-c

                    Exploits

                    barindex
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00407538 _wcslen,CoGetObject,14_2_00407538
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_0040928E
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,14_2_0041C322
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,14_2_0040C388
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_004096A0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,14_2_00408847
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00407877 FindFirstFileW,FindNextFileW,14_2_00407877
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040BB6B
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00419B86
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040BD72
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00407CD2
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 4x nop then jmp 06E3847Ch9_2_06E37CBD
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 4x nop then jmp 06E3847Ch9_2_06E37D31

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49733 -> 176.9.23.58:3984
                    Source: Malware configuration extractorURLs: milliondollar23.duckdns.org
                    Source: unknownDNS query: name: milliondollar23.duckdns.org
                    Source: global trafficTCP traffic: 192.168.2.4:49733 -> 176.9.23.58:3984
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                    Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49734 -> 178.237.33.50:80
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,14_2_0041B411
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: milliondollar23.duckdns.org
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4140344942.00000000018EA000.00000004.00000020.00020000.00000000.sdmp, MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.00000000018A7000.00000004.00000020.00020000.00000000.sdmp, pvTSOIBBT.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, pvTSOIBBT.exe, 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp:b4
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpYbQ
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpbb
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1736439183.0000000002642000.00000004.00000800.00020000.00000000.sdmp, pvTSOIBBT.exe, 00000009.00000002.1774913650.0000000002D32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmp, MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740493445.0000000004F54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000014_2_0040A2F3
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,14_2_0040B749
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_004168FC
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,14_2_0040B749
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,14_2_0040A41B
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4140725922.00000000033EF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1753117489.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 7288, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041CA6D SystemParametersInfoW,14_2_0041CA6D
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041CA73 SystemParametersInfoW,14_2_0041CA73

                    System Summary

                    barindex
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,14_2_004167EF
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_051D7CF09_2_051D7CF0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_051D01A09_2_051D01A0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_051D0F5B9_2_051D0F5B
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_051D0F689_2_051D0F68
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_051D7CE09_2_051D7CE0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_052BBDF99_2_052BBDF9
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_052BBE309_2_052BBE30
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_052BBE1F9_2_052BBE1F
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E327809_2_06E32780
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E327909_2_06E32790
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E31F1A9_2_06E31F1A
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E334F09_2_06E334F0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E342D09_2_06E342D0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E32BC89_2_06E32BC8
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E323589_2_06E32358
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_06E3A0209_2_06E3A020
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043706A14_2_0043706A
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041400514_2_00414005
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043E11C14_2_0043E11C
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004541D914_2_004541D9
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004381E814_2_004381E8
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041F18B14_2_0041F18B
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0044627014_2_00446270
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043E34B14_2_0043E34B
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004533AB14_2_004533AB
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0042742E14_2_0042742E
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043756614_2_00437566
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043E5A814_2_0043E5A8
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004387F014_2_004387F0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043797E14_2_0043797E
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004339D714_2_004339D7
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0044DA4914_2_0044DA49
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00427AD714_2_00427AD7
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041DBF314_2_0041DBF3
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00427C4014_2_00427C40
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00437DB314_2_00437DB3
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00435EEB14_2_00435EEB
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043DEED14_2_0043DEED
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00426E9F14_2_00426E9F
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: String function: 00434801 appears 41 times
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: String function: 00401E65 appears 34 times
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: String function: 00434E70 appears 54 times
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1741804374.0000000006C10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs MT103 CIBC Ref No EBOTT40930537914.exe
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs MT103 CIBC Ref No EBOTT40930537914.exe
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000000.1681138743.0000000000288000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBzlo.exe, vs MT103 CIBC Ref No EBOTT40930537914.exe
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1734884603.000000000099E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MT103 CIBC Ref No EBOTT40930537914.exe
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeBinary or memory string: OriginalFilenameBzlo.exe, vs MT103 CIBC Ref No EBOTT40930537914.exe
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: pvTSOIBBT.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, bC3TKU3RDOVn85jxMU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, SG7rBlXvo8MXkMpFsW.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, SG7rBlXvo8MXkMpFsW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, SG7rBlXvo8MXkMpFsW.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, bC3TKU3RDOVn85jxMU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, SG7rBlXvo8MXkMpFsW.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, SG7rBlXvo8MXkMpFsW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, SG7rBlXvo8MXkMpFsW.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@21/17@2/2
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,14_2_0041798D
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,14_2_0040F4AF
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,14_2_0041B539
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_0041AADB
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeFile created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7608:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7180:120:WilError_03
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-3XAFQF
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6780:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7108:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMutant created: \Sessions\1\BaseNamedObjects\NewqwpHKTg
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5126.tmpJump to behavior
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeFile read: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: winmm.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: wininet.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: rstrtmgr.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, SG7rBlXvo8MXkMpFsW.cs.Net Code: XMVa712AhC System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, SG7rBlXvo8MXkMpFsW.cs.Net Code: XMVa712AhC System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.50d0000.4.raw.unpack, RZ.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.2748f34.0.raw.unpack, RZ.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 9.2.pvTSOIBBT.exe.2e38dc4.0.raw.unpack, RZ.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeCode function: 0_2_00BB5E50 push esp; ret 0_2_00BB5E69
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeCode function: 0_2_073D4CAA pushfd ; iretd 0_2_073D4CB9
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_02AC5E50 push esp; ret 9_2_02AC5E69
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_052B251B push eax; retf 9_2_052B2521
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_052B2563 pushfd ; retf 9_2_052B2569
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_052B0308 push esp; ret 9_2_052B0321
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_052BEAA1 push C3FD8100h; ret 9_2_052BEAFC
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_070C4CAA pushfd ; iretd 9_2_070C4CB9
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_070C4BFB push eax; iretd 9_2_070C4C01
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 9_2_070CFCA0 pushfd ; retf 9_2_070CFCA1
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00457186 push ecx; ret 14_2_00457199
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041C7F3 push eax; retf 14_2_0041C7FD
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00457AA8 push eax; ret 14_2_00457AC6
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00434EB6 push ecx; ret 14_2_00434EC9
                    Source: MT103 CIBC Ref No EBOTT40930537914.exeStatic PE information: section name: .text entropy: 7.84950866621739
                    Source: pvTSOIBBT.exe.0.drStatic PE information: section name: .text entropy: 7.84950866621739
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, uU97KD122Rm9vyQw3f.csHigh entropy of concatenated method names: 'CRkJ9RjQNO', 'IAJJrRc8EY', 'GL3JY75ph4', 'NQnJDGYZuE', 'VxgJZlWfJR', 'E7fJ4yraos', 'SHNJXd9Bm8', 'qsyJVcbw0H', 'iDcJqxP8p9', 'KHyJkdjlNG'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, LWFPL4N0QynFjuO4c4.csHigh entropy of concatenated method names: 'mqDqpqqtUL', 'A1nqATqFqb', 'mWIqapBybu', 'mL3qFycMov', 'BSCqjRvHCN', 'q25qtSDVPy', 'JmkqBFoVWw', 'V9RVxA73U0', 'vAZVCPokLK', 'BYyVH635Hx'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, W2g8bHHlZL7xe57oV7.csHigh entropy of concatenated method names: 'd2AVImNEGp', 'XKEVv1ZAqV', 'pZIV0fJhQL', 'y4WViPcYjN', 'oO6VcGuJ9t', 'X4NVn4fptL', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, rPdBro946rqRhrcsoY.csHigh entropy of concatenated method names: 'syupQI2wJ6', 'e0gp1WLcgd', 'QK5pudJMTI', 'JslpmYT6h1', 'wl8pZ6IjOE', 'ui6p44KLOf', 'CJ8xNZfHNbb35Kydnw', 'uCnsdwQuBU9dHkKeEl', 'sfIppwtkU0', 'gtkpALVZms'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, G31Zfm213J1hjsZqZK.csHigh entropy of concatenated method names: 'kvRVFlFY89', 'aZtVjv4dyZ', 'fBSVJnQuKl', 'Ys9VtcGLHx', 'gbfVBwblaC', 'QCgVQ7XDkX', 'rncV1bG5rW', 'F6IVhcl7hC', 'EtBVu5910f', 'TARVmq5cpq'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, vQvUfhtFmvxAWVUMFY.csHigh entropy of concatenated method names: 'r6AZK3jAy4', 'TREZgux2dc', 'yPuZcbOigt', 'IoAZsbOXY3', 'l7SZvMMiKV', 'ocVZ0pCIJJ', 'BouZiZex7J', 'DE3Znk2fcr', 'eXEZ3G3ZYo', 'FBaZdfGNni'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, Skd3IaRSl3KWGlbPTT.csHigh entropy of concatenated method names: 'WyiXCPnOGR', 'OK4X2bPVyE', 'oEhVl46MD5', 'R8RVpVna4k', 'n3RXRqWFAT', 'biJXgJkCF7', 'LZVXbucWk8', 'XEtXcOPwdN', 'sUeXsBKW6G', 'tJmXMmbYTv'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, xhOq1xJKbrjDhM2fA8.csHigh entropy of concatenated method names: 'uDIQFTJJRm', 'WcAQJJ5yS6', 'OEQQBaJ5oM', 'miXB2sIZiK', 'unOBzowd4B', 'wYgQlcoMwX', 'P0hQpFC7EU', 'WcGQ5kEKmC', 'feCQABMUMm', 'aVVQacVOej'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, hCHKtGBr2FZI5kBAL5.csHigh entropy of concatenated method names: 'IBV8YCpKm6', 'RKP8De26IW', 'WFs8IL8hIB', 'zWK8vVhv12', 'aX58iV0FIY', 'KT78n77c01', 'fBy8d82Ed4', 'eHH8ybY5Ra', 'GIo8KIEVyd', 'ljk8RdpVLZ'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, Gxe2X07q013LMk0R8L.csHigh entropy of concatenated method names: 'VLdtwRoJQF', 'GYktfA1aHi', 'ws2J0mItoK', 'JL4JirP53O', 'iZmJneYdeg', 'g8RJ3SCgsq', 'UbCJdyMtiT', 'QniJyNScPp', 'EMSJS4o07n', 'JydJKX6ex0'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, mxQ7T3zSp2odbtxWjH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'J3Gq8HjPGa', 'WaMqZaydYE', 'yaVq4tdsg5', 'A5XqXbFWTt', 'bD1qVj3jTs', 'rJ3qqBs92U', 'dHHqkLrBFj'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, RLTvNd8b2Ud2ymEd9p.csHigh entropy of concatenated method names: 'Dispose', 'AqJpHPUeU0', 'WoV5v7SX8f', 'gHOooE2cpR', 'o6Fp29SBr8', 'He5pz8GLYk', 'ProcessDialogKey', 'zgb5lkx437', 'mRl5pg8Wiq', 'Gn055v1u9b'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, bC3TKU3RDOVn85jxMU.csHigh entropy of concatenated method names: 'b4AjcO05wB', 'HTsjsSJcbn', 'jWLjM8V6kg', 'ypKjLuudRw', 'eQFjOfVEWq', 'da3jTtxj1F', 'pUUjxgprT4', 'UDMjCAMa1y', 'fHMjHvlQEu', 'Ks0j2HbuYX'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, esGa5BoSlsHbhhNmOH.csHigh entropy of concatenated method names: 'YyfBWxsC2y', 'KtKBjTgnDj', 'EJ2BtMK8Ms', 'GEyBQte3q5', 'xakB16N4es', 'nHhtOdqjMI', 'CGttTJ5ALM', 'NwEtxnYl7s', 'RAHtCP3E7R', 'VHStH43oZK'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, Cng5TLpZreJYlUnwEL.csHigh entropy of concatenated method names: 'Jqt7DUWiL', 'DPg9ksacK', 'hIIrdgbN2', 'KIJfkAexw', 'eseDoqwqa', 'PHuUIsEan', 'qE9PAWOEj4m16HGNHo', 'CVqlPboQ37buKwranD', 'Nrn30d1cyPKDQJw8Am', 'peCVmOwXM'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, csgXGlratW42A5c9h3.csHigh entropy of concatenated method names: 'LKqQEwF5YT', 'LxQQeROIYk', 'aUaQ7wdWhg', 'vExQ9ho5PG', 'CFlQwdAFbc', 'AMRQrcLbZS', 'vOqQfU8ut4', 'BHgQYJgUv1', 'TFuQDo70PG', 'jHQQUqoUxy'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, lN8FbZ6aeKbn5pUPXoS.csHigh entropy of concatenated method names: 'P2EqEXYL02', 'j7BqeY6IUB', 'sEZq7AnBI6', 'H07q909NHR', 'iV5qwmG3IP', 'exGqryyjSi', 'bJtqfxRepd', 'yGsqYbNB1X', 'kjfqD2MUE5', 'Pe3qUTiWGL'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, SG7rBlXvo8MXkMpFsW.csHigh entropy of concatenated method names: 'NEKAWY6uMp', 'hDAAFi9BKq', 'OnAAjQjel7', 'f10AJNGVt5', 'UN6AtOSAPn', 'YCTABioW0n', 'byiAQJtwHe', 'UGlA1TtGUN', 'vdUAhQxOAQ', 'CcRAuSZFUR'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.37a23c0.2.raw.unpack, NfaYvM6SstWn8d6MDuT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gHGkc0xg8O', 'rFtksEcNMY', 'MhgkMfVlTS', 'w87kL6bWEn', 'epSkOMMYro', 'xFykThA6vr', 'FHJkxSF7Bc'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, uU97KD122Rm9vyQw3f.csHigh entropy of concatenated method names: 'CRkJ9RjQNO', 'IAJJrRc8EY', 'GL3JY75ph4', 'NQnJDGYZuE', 'VxgJZlWfJR', 'E7fJ4yraos', 'SHNJXd9Bm8', 'qsyJVcbw0H', 'iDcJqxP8p9', 'KHyJkdjlNG'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, LWFPL4N0QynFjuO4c4.csHigh entropy of concatenated method names: 'mqDqpqqtUL', 'A1nqATqFqb', 'mWIqapBybu', 'mL3qFycMov', 'BSCqjRvHCN', 'q25qtSDVPy', 'JmkqBFoVWw', 'V9RVxA73U0', 'vAZVCPokLK', 'BYyVH635Hx'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, W2g8bHHlZL7xe57oV7.csHigh entropy of concatenated method names: 'd2AVImNEGp', 'XKEVv1ZAqV', 'pZIV0fJhQL', 'y4WViPcYjN', 'oO6VcGuJ9t', 'X4NVn4fptL', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, rPdBro946rqRhrcsoY.csHigh entropy of concatenated method names: 'syupQI2wJ6', 'e0gp1WLcgd', 'QK5pudJMTI', 'JslpmYT6h1', 'wl8pZ6IjOE', 'ui6p44KLOf', 'CJ8xNZfHNbb35Kydnw', 'uCnsdwQuBU9dHkKeEl', 'sfIppwtkU0', 'gtkpALVZms'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, G31Zfm213J1hjsZqZK.csHigh entropy of concatenated method names: 'kvRVFlFY89', 'aZtVjv4dyZ', 'fBSVJnQuKl', 'Ys9VtcGLHx', 'gbfVBwblaC', 'QCgVQ7XDkX', 'rncV1bG5rW', 'F6IVhcl7hC', 'EtBVu5910f', 'TARVmq5cpq'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, vQvUfhtFmvxAWVUMFY.csHigh entropy of concatenated method names: 'r6AZK3jAy4', 'TREZgux2dc', 'yPuZcbOigt', 'IoAZsbOXY3', 'l7SZvMMiKV', 'ocVZ0pCIJJ', 'BouZiZex7J', 'DE3Znk2fcr', 'eXEZ3G3ZYo', 'FBaZdfGNni'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, Skd3IaRSl3KWGlbPTT.csHigh entropy of concatenated method names: 'WyiXCPnOGR', 'OK4X2bPVyE', 'oEhVl46MD5', 'R8RVpVna4k', 'n3RXRqWFAT', 'biJXgJkCF7', 'LZVXbucWk8', 'XEtXcOPwdN', 'sUeXsBKW6G', 'tJmXMmbYTv'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, xhOq1xJKbrjDhM2fA8.csHigh entropy of concatenated method names: 'uDIQFTJJRm', 'WcAQJJ5yS6', 'OEQQBaJ5oM', 'miXB2sIZiK', 'unOBzowd4B', 'wYgQlcoMwX', 'P0hQpFC7EU', 'WcGQ5kEKmC', 'feCQABMUMm', 'aVVQacVOej'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, hCHKtGBr2FZI5kBAL5.csHigh entropy of concatenated method names: 'IBV8YCpKm6', 'RKP8De26IW', 'WFs8IL8hIB', 'zWK8vVhv12', 'aX58iV0FIY', 'KT78n77c01', 'fBy8d82Ed4', 'eHH8ybY5Ra', 'GIo8KIEVyd', 'ljk8RdpVLZ'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, Gxe2X07q013LMk0R8L.csHigh entropy of concatenated method names: 'VLdtwRoJQF', 'GYktfA1aHi', 'ws2J0mItoK', 'JL4JirP53O', 'iZmJneYdeg', 'g8RJ3SCgsq', 'UbCJdyMtiT', 'QniJyNScPp', 'EMSJS4o07n', 'JydJKX6ex0'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, mxQ7T3zSp2odbtxWjH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'J3Gq8HjPGa', 'WaMqZaydYE', 'yaVq4tdsg5', 'A5XqXbFWTt', 'bD1qVj3jTs', 'rJ3qqBs92U', 'dHHqkLrBFj'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, RLTvNd8b2Ud2ymEd9p.csHigh entropy of concatenated method names: 'Dispose', 'AqJpHPUeU0', 'WoV5v7SX8f', 'gHOooE2cpR', 'o6Fp29SBr8', 'He5pz8GLYk', 'ProcessDialogKey', 'zgb5lkx437', 'mRl5pg8Wiq', 'Gn055v1u9b'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, bC3TKU3RDOVn85jxMU.csHigh entropy of concatenated method names: 'b4AjcO05wB', 'HTsjsSJcbn', 'jWLjM8V6kg', 'ypKjLuudRw', 'eQFjOfVEWq', 'da3jTtxj1F', 'pUUjxgprT4', 'UDMjCAMa1y', 'fHMjHvlQEu', 'Ks0j2HbuYX'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, esGa5BoSlsHbhhNmOH.csHigh entropy of concatenated method names: 'YyfBWxsC2y', 'KtKBjTgnDj', 'EJ2BtMK8Ms', 'GEyBQte3q5', 'xakB16N4es', 'nHhtOdqjMI', 'CGttTJ5ALM', 'NwEtxnYl7s', 'RAHtCP3E7R', 'VHStH43oZK'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, Cng5TLpZreJYlUnwEL.csHigh entropy of concatenated method names: 'Jqt7DUWiL', 'DPg9ksacK', 'hIIrdgbN2', 'KIJfkAexw', 'eseDoqwqa', 'PHuUIsEan', 'qE9PAWOEj4m16HGNHo', 'CVqlPboQ37buKwranD', 'Nrn30d1cyPKDQJw8Am', 'peCVmOwXM'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, csgXGlratW42A5c9h3.csHigh entropy of concatenated method names: 'LKqQEwF5YT', 'LxQQeROIYk', 'aUaQ7wdWhg', 'vExQ9ho5PG', 'CFlQwdAFbc', 'AMRQrcLbZS', 'vOqQfU8ut4', 'BHgQYJgUv1', 'TFuQDo70PG', 'jHQQUqoUxy'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, lN8FbZ6aeKbn5pUPXoS.csHigh entropy of concatenated method names: 'P2EqEXYL02', 'j7BqeY6IUB', 'sEZq7AnBI6', 'H07q909NHR', 'iV5qwmG3IP', 'exGqryyjSi', 'bJtqfxRepd', 'yGsqYbNB1X', 'kjfqD2MUE5', 'Pe3qUTiWGL'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, SG7rBlXvo8MXkMpFsW.csHigh entropy of concatenated method names: 'NEKAWY6uMp', 'hDAAFi9BKq', 'OnAAjQjel7', 'f10AJNGVt5', 'UN6AtOSAPn', 'YCTABioW0n', 'byiAQJtwHe', 'UGlA1TtGUN', 'vdUAhQxOAQ', 'CcRAuSZFUR'
                    Source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.6c10000.5.raw.unpack, NfaYvM6SstWn8d6MDuT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gHGkc0xg8O', 'rFtksEcNMY', 'MhgkMfVlTS', 'w87kL6bWEn', 'epSkOMMYro', 'xFykThA6vr', 'FHJkxSF7Bc'
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00406EEB ShellExecuteW,URLDownloadToFileW,14_2_00406EEB
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeFile created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp"
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_0041AADB

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: pvTSOIBBT.exe PID: 7424, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040F7E2 Sleep,ExitProcess,14_2_0040F7E2
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: BB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: 2600000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: 2400000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: 7580000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: 6E10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: 8580000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: 9580000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory allocated: 2CF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory allocated: 2BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory allocated: 7490000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory allocated: 8490000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory allocated: 8620000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory allocated: 9620000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,14_2_0041A7D9
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6636Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1509Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7958Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1593Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeWindow / User API: threadDelayed 3069Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeWindow / User API: threadDelayed 6413Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeWindow / User API: foregroundWindowGot 1767Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeAPI coverage: 6.2 %
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe TID: 4548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4340Thread sleep count: 6636 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4340Thread sleep count: 1509 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7344Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7260Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7352Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe TID: 7328Thread sleep count: 233 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe TID: 7328Thread sleep time: -116500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe TID: 7332Thread sleep count: 3069 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe TID: 7332Thread sleep time: -9207000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe TID: 7332Thread sleep count: 6413 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe TID: 7332Thread sleep time: -19239000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe TID: 7536Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_0040928E
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,14_2_0041C322
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,14_2_0040C388
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_004096A0
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,14_2_00408847
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00407877 FindFirstFileW,FindNextFileW,14_2_00407877
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040BB6B
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00419B86
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040BD72
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00407CD2
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4140344942.00000000018EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWG]
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4140344942.00000000018EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: pvTSOIBBT.exe, 00000009.00000002.1780986044.000000000700A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: pvTSOIBBT.exe, 00000009.00000002.1780986044.000000000700A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00434A8A
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00443355 mov eax, dword ptr fs:[00000030h]14_2_00443355
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_004120B2 GetProcessHeap,HeapFree,14_2_004120B2
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_0043503C
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00434A8A
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0043BB71
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00434BD8 SetUnhandledExceptionFilter,14_2_00434BD8
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMemory written: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe14_2_00412132
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00419662 mouse_event,14_2_00419662
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeProcess created: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeProcess created: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"Jump to behavior
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.00000000018C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerD
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.00000000018C4000.00000004.00000020.00020000.00000000.sdmp, MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4140344942.00000000018DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.00000000018C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager/
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager)
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4140344942.00000000018DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQF\
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4140344942.00000000018DF000.00000004.00000020.00020000.00000000.sdmp, MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, logs.dat.8.drBinary or memory string: [Program Manager]
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_00434CB6 cpuid 14_2_00434CB6
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: EnumSystemLocalesW,14_2_0045201B
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: EnumSystemLocalesW,14_2_004520B6
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,14_2_00452143
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetLocaleInfoW,14_2_00452393
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: EnumSystemLocalesW,14_2_00448484
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,14_2_004524BC
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetLocaleInfoW,14_2_004525C3
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,14_2_00452690
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetLocaleInfoW,14_2_0044896D
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: GetLocaleInfoA,14_2_0040F90C
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,14_2_00451D58
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: EnumSystemLocalesW,14_2_00451FD0
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeQueries volume information: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041A045 __EH_prolog,GdiplusStartup,CreateDirectoryW,Sleep,Sleep,GetLocalTime,Sleep,14_2_0041A045
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0041B69E GetUserNameW,14_2_0041B69E
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: 14_2_0044942D _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,14_2_0044942D
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4140725922.00000000033EF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1753117489.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 7288, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data14_2_0040BA4D
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\14_2_0040BB6B
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: \key3.db14_2_0040BB6B

                    Remote Access Functionality

                    barindex
                    Source: C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-3XAFQFJump to behavior
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-3XAFQF
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.pvTSOIBBT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3609970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MT103 CIBC Ref No EBOTT40930537914.exe.3682590.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4140725922.00000000033EF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1753117489.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 1004, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MT103 CIBC Ref No EBOTT40930537914.exe PID: 7288, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: pvTSOIBBT.exe PID: 7660, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\AppData\Roaming\pvTSOIBBT.exeCode function: cmd.exe14_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    2
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    1
                    Access Token Manipulation
                    4
                    Obfuscated Files or Information
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    12
                    Software Packing
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture1
                    Remote Access Software
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                    Process Injection
                    1
                    DLL Side-Loading
                    LSA Secrets33
                    System Information Discovery
                    SSHKeylogging2
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Scheduled Task/Job
                    1
                    Bypass User Account Control
                    Cached Domain Credentials21
                    Security Software Discovery
                    VNCGUI Input Capture22
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync31
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                    Virtualization/Sandbox Evasion
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
                    Process Injection
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529365 Sample: MT103 CIBC Ref No EBOTT4093... Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 51 milliondollar23.duckdns.org 2->51 53 geoplugin.net 2->53 59 Suricata IDS alerts for network traffic 2->59 61 Found malware configuration 2->61 63 Malicious sample detected (through community Yara rule) 2->63 67 13 other signatures 2->67 8 pvTSOIBBT.exe 5 2->8         started        11 MT103 CIBC Ref No EBOTT40930537914.exe 7 2->11         started        signatures3 65 Uses dynamic DNS services 51->65 process4 file5 69 Antivirus detection for dropped file 8->69 71 Contains functionality to bypass UAC (CMSTPLUA) 8->71 73 Contains functionalty to change the wallpaper 8->73 77 6 other signatures 8->77 14 pvTSOIBBT.exe 8->14         started        17 schtasks.exe 8->17         started        19 pvTSOIBBT.exe 8->19         started        43 C:\Users\user\AppData\Roaming\pvTSOIBBT.exe, PE32 11->43 dropped 45 C:\Users\...\pvTSOIBBT.exe:Zone.Identifier, ASCII 11->45 dropped 47 C:\Users\user\AppData\Local\...\tmp5126.tmp, XML 11->47 dropped 49 MT103 CIBC Ref No ...40930537914.exe.log, ASCII 11->49 dropped 75 Adds a directory exclusion to Windows Defender 11->75 21 MT103 CIBC Ref No EBOTT40930537914.exe 3 15 11->21         started        25 powershell.exe 23 11->25         started        27 powershell.exe 23 11->27         started        29 schtasks.exe 1 11->29         started        signatures6 process7 dnsIp8 31 conhost.exe 17->31         started        55 milliondollar23.duckdns.org 176.9.23.58, 3984, 49733 HETZNER-ASDE Germany 21->55 57 geoplugin.net 178.237.33.50, 49734, 80 ATOM86-ASATOM86NL Netherlands 21->57 41 C:\ProgramData\remcos\logs.dat, data 21->41 dropped 79 Detected Remcos RAT 21->79 81 Installs a global keyboard hook 21->81 83 Loading BitLocker PowerShell Module 25->83 33 conhost.exe 25->33         started        35 WmiPrvSE.exe 25->35         started        37 conhost.exe 27->37         started        39 conhost.exe 29->39         started        file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    MT103 CIBC Ref No EBOTT40930537914.exe100%AviraHEUR/AGEN.1309290
                    MT103 CIBC Ref No EBOTT40930537914.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\pvTSOIBBT.exe100%AviraHEUR/AGEN.1309290
                    C:\Users\user\AppData\Roaming\pvTSOIBBT.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.fontbureau.com0%URL Reputationsafe
                    http://www.fontbureau.com/designersG0%URL Reputationsafe
                    http://www.fontbureau.com/designers/?0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.fontbureau.com/designers?0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fontbureau.com/designers0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fontbureau.com/designers80%URL Reputationsafe
                    http://www.fonts.com0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    milliondollar23.duckdns.org
                    176.9.23.58
                    truetrue
                      unknown
                      geoplugin.net
                      178.237.33.50
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gpfalse
                        • URL Reputation: safe
                        unknown
                        milliondollar23.duckdns.orgtrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.apache.org/licenses/LICENSE-2.0MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://www.fontbureau.comMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersGMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/bTheMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.goodfont.co.krMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://geoplugin.net/json.gpSystem32MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://geoplugin.net/json.gpbbMT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://www.carterandcone.comlMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/cTheMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htmMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-user.htmlMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://geoplugin.net/json.gp/CMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, pvTSOIBBT.exe, 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fonts.comMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sandoll.co.krMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://geoplugin.net/json.gp:b4MT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://www.urwpp.deDPleaseMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://geoplugin.net/json.gpYbQMT103 CIBC Ref No EBOTT40930537914.exe, 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1736439183.0000000002642000.00000004.00000800.00020000.00000000.sdmp, pvTSOIBBT.exe, 00000009.00000002.1774913650.0000000002D32000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comMT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740954500.0000000006712000.00000004.00000800.00020000.00000000.sdmp, MT103 CIBC Ref No EBOTT40930537914.exe, 00000000.00000002.1740493445.0000000004F54000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    176.9.23.58
                                    milliondollar23.duckdns.orgGermany
                                    24940HETZNER-ASDEtrue
                                    178.237.33.50
                                    geoplugin.netNetherlands
                                    8455ATOM86-ASATOM86NLfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1529365
                                    Start date and time:2024-10-08 22:42:34 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 9m 13s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:19
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:MT103 CIBC Ref No EBOTT40930537914.exe
                                    (renamed file extension from pif to exe)
                                    Original Sample Name:MT103 CIBC Ref No EBOTT40930537914.pif
                                    Detection:MAL
                                    Classification:mal100.rans.troj.spyw.expl.evad.winEXE@21/17@2/2
                                    EGA Information:
                                    • Successful, ratio: 75%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 246
                                    • Number of non-executed functions: 223
                                    Cookbook Comments:
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target MT103 CIBC Ref No EBOTT40930537914.exe, PID 7288 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: MT103 CIBC Ref No EBOTT40930537914.exe
                                    TimeTypeDescription
                                    16:43:27API Interceptor7608172x Sleep call for process: MT103 CIBC Ref No EBOTT40930537914.exe modified
                                    16:43:29API Interceptor29x Sleep call for process: powershell.exe modified
                                    16:43:32API Interceptor1x Sleep call for process: pvTSOIBBT.exe modified
                                    21:43:31Task SchedulerRun new task: pvTSOIBBT path: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    176.9.23.58BL-TLN0124796CMACGM.scr.exeGet hashmaliciousRemcosBrowse
                                      178.237.33.50Quote.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      AY908774.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      H6s8pGsYjg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • geoplugin.net/json.gp
                                      asXlZG3aW6.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • geoplugin.net/json.gp
                                      Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      zYJYK66EGb.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      ISF 10+2 - SO - SO 4042 - ROTHENBERGER USA, INC#U51fa#U8ca8 TWSE0211390.scr.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      1728373206596a852cdbe7ae697de423fbd80cabe33d7a6a584032b72164b61e0692c12d1a849.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      milliondollar23.duckdns.orgBL-TLN0124796CMACGM.scr.exeGet hashmaliciousRemcosBrowse
                                      • 176.9.23.58
                                      MT103-7543324334.exeGet hashmaliciousRemcosBrowse
                                      • 138.201.150.244
                                      rSCAN31804.exeGet hashmaliciousGuLoader, RemcosBrowse
                                      • 138.201.150.244
                                      MT103-7543324334hsbc.com.exeGet hashmaliciousRemcosBrowse
                                      • 138.201.150.244
                                      FACTURA08798696.vbeGet hashmaliciousGuLoader, RemcosBrowse
                                      • 138.201.150.244
                                      SCAN00381638.SCR.exeGet hashmaliciousGuLoader, RemcosBrowse
                                      • 138.201.150.244
                                      oeillet.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 172.245.214.71
                                      DHL04AWB01173903102023PDF.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 79.134.225.111
                                      geoplugin.netQuote.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      AY908774.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      H6s8pGsYjg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 178.237.33.50
                                      asXlZG3aW6.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 178.237.33.50
                                      Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      zYJYK66EGb.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      ISF 10+2 - SO - SO 4042 - ROTHENBERGER USA, INC#U51fa#U8ca8 TWSE0211390.scr.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      1728373206596a852cdbe7ae697de423fbd80cabe33d7a6a584032b72164b61e0692c12d1a849.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      HETZNER-ASDEhttps://keepass.info/news/n240601_2.57.html#v1Get hashmaliciousUnknownBrowse
                                      • 49.12.134.143
                                      fBcMVl6ns6.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                      • 136.243.141.187
                                      rpQF1aDIK4.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                      • 136.243.141.187
                                      test.ps1Get hashmaliciousRHADAMANTHYSBrowse
                                      • 136.243.141.187
                                      path.ps1Get hashmaliciousDcRatBrowse
                                      • 136.243.141.187
                                      ssk7Ah3h5D.elfGet hashmaliciousUnknownBrowse
                                      • 116.203.104.203
                                      https://hnt.zkg.mybluehost.me/CA/LETGet hashmaliciousHTMLPhisherBrowse
                                      • 135.181.58.223
                                      SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                      • 136.243.38.220
                                      SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                      • 136.243.38.220
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 138.201.28.181
                                      ATOM86-ASATOM86NLQuote.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      AY908774.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      H6s8pGsYjg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 178.237.33.50
                                      asXlZG3aW6.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 178.237.33.50
                                      Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      zYJYK66EGb.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      ISF 10+2 - SO - SO 4042 - ROTHENBERGER USA, INC#U51fa#U8ca8 TWSE0211390.scr.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      1728373206596a852cdbe7ae697de423fbd80cabe33d7a6a584032b72164b61e0692c12d1a849.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):144
                                      Entropy (8bit):3.402054886640339
                                      Encrypted:false
                                      SSDEEP:3:rhlKlM+VlfmNKfmwl55JWRal2Jl+7R0DAlBG45klovDl6v:6lJeNKfZb5YcIeeDAlOWAv
                                      MD5:95E11DB4320A9F0EA9F1DAF61D95C9E1
                                      SHA1:DEC781785EC389F1872CA1A03787CDC65FEE44F2
                                      SHA-256:B7A048BC98EEA5183FE04D0B2E851CE8B5DE3327566F3EBF4415AB5A289395A1
                                      SHA-512:D16BE0FBC5F76D43449854D925407AB2B3F81157E61C0544BDE93C8BD9FBAE0C7A7FA0BAE1E1AFC54BE0E1F176BB57CF90B2C1283219EED3517D184FEC592F17
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                      Reputation:low
                                      Preview:....[.2.0.2.4./.1.0./.0.8. .1.6.:.4.3.:.2.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                      Process:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.34331486778365
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                      Process:C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.34331486778365
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                      Process:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):962
                                      Entropy (8bit):5.013811273052389
                                      Encrypted:false
                                      SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                      MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                      SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                      SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                      SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                      Malicious:false
                                      Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2232
                                      Entropy (8bit):5.379736180876081
                                      Encrypted:false
                                      SSDEEP:48:tWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:tLHyIFKL3IZ2KRH9Oug8s
                                      MD5:AE33CC731D64A142DFCC6A541D0708FC
                                      SHA1:31B0ECD28CA8892C3EF4B42D1CB1F56BECD14BEA
                                      SHA-256:776FC4031835093845318CEABF43AB13C51EC6CA69B985C45049EAE2EB6AF623
                                      SHA-512:5282E64561D28CB77C92089BEAF27D83EC55B2A673BEF6EAB4DFC49BE61A0F6653E73F07A45AFBF93C407546D04BB50D9690CCBF553227A4E6CFE4F98389C211
                                      Malicious:false
                                      Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1575
                                      Entropy (8bit):5.109294824502763
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtas++xvn:cge1wYrFdOFzOzN33ODOiDdKrsuTtv
                                      MD5:1CBBA8541472EDF6E7F13DC1FDA046BF
                                      SHA1:49653D83E986F66B36E52A3A23378593ADBE311A
                                      SHA-256:6F812272809BE295664761722C7F489FB530137D38810FD357CDF9782CFD6176
                                      SHA-512:1AC631A1053AD28BBC938B012166A74B6646FB9F3498DA0C7ACC155158EAC6894BDFABF0D470C509FB8E7129ED9F02FBDE71B2DFC5E67542367ED4EDD306E86D
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                      Process:C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1575
                                      Entropy (8bit):5.109294824502763
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtas++xvn:cge1wYrFdOFzOzN33ODOiDdKrsuTtv
                                      MD5:1CBBA8541472EDF6E7F13DC1FDA046BF
                                      SHA1:49653D83E986F66B36E52A3A23378593ADBE311A
                                      SHA-256:6F812272809BE295664761722C7F489FB530137D38810FD357CDF9782CFD6176
                                      SHA-512:1AC631A1053AD28BBC938B012166A74B6646FB9F3498DA0C7ACC155158EAC6894BDFABF0D470C509FB8E7129ED9F02FBDE71B2DFC5E67542367ED4EDD306E86D
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                      Process:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1001984
                                      Entropy (8bit):7.844522818130924
                                      Encrypted:false
                                      SSDEEP:24576:95EwHjgfwxXUCswKlVV3iSuoili7gGn/4S1:9Sws4xXU9wKlVkSCkgGnwS
                                      MD5:3C228F541D5F99E928FC4F9A0993F45C
                                      SHA1:FF3E24330AAE208FE5C11FF45A2D913C683E55D9
                                      SHA-256:918B9E2AB61A0EF85ED819B7ED4886F3FE23D34059CB87003FC8D73195E5D438
                                      SHA-512:CAA3A9FCAD749EEB1E64F931177B82B7693DC26EE0D6811EB26EF294884E8F853B7C583ED65AAD71B24B416E7E954780FCDDEB114BB8F10A5A92DC137EC9AC8B
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0..B..........^`... ........@.. ....................................`..................................`..O.......d............................................................................ ............... ..H............text...d@... ...B.................. ..`.rsrc...d............D..............@..@.reloc...............H..............@..B................@`......H.......,t...x..........<....s............................................{....*"..}....*..(.....(......(.....{.....o....*v..{....o....(....(.....( ...*.0..$.......r...pr...p.... (!..........&&*("...*z.,..{....,..{....o#.....($...*..0...........s%...}.....s&...}.....s&...}.....s'...}.....{....o(....()....{....r'..p"..HA.. ....s*...o+....{.....0.1s,...o-....{....rQ..po.....{.... ......s/...o0....{.....o1....{....rw..po2....{..... o3....{....r'..p"...A.. ....s*...o+....{......
                                      Process:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.844522818130924
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:MT103 CIBC Ref No EBOTT40930537914.exe
                                      File size:1'001'984 bytes
                                      MD5:3c228f541d5f99e928fc4f9a0993f45c
                                      SHA1:ff3e24330aae208fe5c11ff45a2d913c683e55d9
                                      SHA256:918b9e2ab61a0ef85ed819b7ed4886f3fe23d34059cb87003fc8d73195e5d438
                                      SHA512:caa3a9fcad749eeb1e64f931177b82b7693dc26ee0d6811eb26ef294884e8f853b7c583ed65aad71b24b416e7e954780fcddeb114bb8f10a5a92dc137ec9ac8b
                                      SSDEEP:24576:95EwHjgfwxXUCswKlVV3iSuoili7gGn/4S1:9Sws4xXU9wKlVkSCkgGnwS
                                      TLSH:C12512282618D403C95567700A72F9F417BA9DDEB802E617EEEE7CEBB7A6E400D441C7
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0..B..........^`... ........@.. ....................................`................................
                                      Icon Hash:90cececece8e8eb0
                                      Entrypoint:0x4f605e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6704B11A [Tue Oct 8 04:12:10 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xf600c0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf80000x364.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xfa0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xf40640xf42001f5351522efba67a33874c5a758b64bfFalse0.9274473566308243data7.84950866621739IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xf80000x3640x400fd81d295db7ed338486d6f1c0b6f3f92False0.365234375data2.754054207438572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xfa0000xc0x20076950743440ebe7b4dbf914b4c64365fFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_VERSION0xf80580x308data0.44329896907216493
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-08T22:43:31.766362+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449733176.9.23.583984TCP
                                      2024-10-08T22:43:33.255199+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449734178.237.33.5080TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 8, 2024 22:43:30.944645882 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:30.950122118 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:30.950551033 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:30.957156897 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:30.962141037 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:31.765923977 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:31.766308069 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:31.766361952 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:31.771183968 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:31.771909952 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:31.775130033 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:31.779957056 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:31.780021906 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:31.784786940 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:31.784866095 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:31.789800882 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:32.133991957 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:32.175479889 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:32.202357054 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:32.207613945 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:32.280843019 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:32.331724882 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:32.616792917 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:43:32.622128963 CEST8049734178.237.33.50192.168.2.4
                                      Oct 8, 2024 22:43:32.622221947 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:43:32.630820036 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:43:32.635850906 CEST8049734178.237.33.50192.168.2.4
                                      Oct 8, 2024 22:43:33.255119085 CEST8049734178.237.33.50192.168.2.4
                                      Oct 8, 2024 22:43:33.255198956 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:43:33.269565105 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:33.274455070 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:34.255198002 CEST8049734178.237.33.50192.168.2.4
                                      Oct 8, 2024 22:43:34.255338907 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:43:46.722707987 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:43:46.724426985 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:43:46.729243040 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:44:16.642899036 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:44:16.644972086 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:44:16.649949074 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:44:46.685095072 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:44:46.688432932 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:44:46.693310022 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:45:16.729659081 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:45:16.730935097 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:45:16.736025095 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:45:22.566418886 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:45:22.972923040 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:45:23.582003117 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:45:24.882776022 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:45:27.378793955 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:45:32.269514084 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:45:41.972527981 CEST4973480192.168.2.4178.237.33.50
                                      Oct 8, 2024 22:45:46.774019003 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:45:46.778796911 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:45:46.784365892 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:46:16.817334890 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:46:16.818516016 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:46:16.823462963 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:46:46.867537975 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:46:46.869182110 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:46:46.874053955 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:47:16.888058901 CEST398449733176.9.23.58192.168.2.4
                                      Oct 8, 2024 22:47:16.890705109 CEST497333984192.168.2.4176.9.23.58
                                      Oct 8, 2024 22:47:16.895770073 CEST398449733176.9.23.58192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 8, 2024 22:43:30.784694910 CEST5710553192.168.2.41.1.1.1
                                      Oct 8, 2024 22:43:30.916811943 CEST53571051.1.1.1192.168.2.4
                                      Oct 8, 2024 22:43:32.578321934 CEST5129053192.168.2.41.1.1.1
                                      Oct 8, 2024 22:43:32.586978912 CEST53512901.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 8, 2024 22:43:30.784694910 CEST192.168.2.41.1.1.10x4fddStandard query (0)milliondollar23.duckdns.orgA (IP address)IN (0x0001)false
                                      Oct 8, 2024 22:43:32.578321934 CEST192.168.2.41.1.1.10x9528Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 8, 2024 22:43:30.916811943 CEST1.1.1.1192.168.2.40x4fddNo error (0)milliondollar23.duckdns.org176.9.23.58A (IP address)IN (0x0001)false
                                      Oct 8, 2024 22:43:32.586978912 CEST1.1.1.1192.168.2.40x9528No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                      • geoplugin.net
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449734178.237.33.50807288C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 8, 2024 22:43:32.630820036 CEST71OUTGET /json.gp HTTP/1.1
                                      Host: geoplugin.net
                                      Cache-Control: no-cache
                                      Oct 8, 2024 22:43:33.255119085 CEST1170INHTTP/1.1 200 OK
                                      date: Tue, 08 Oct 2024 20:43:33 GMT
                                      server: Apache
                                      content-length: 962
                                      content-type: application/json; charset=utf-8
                                      cache-control: public, max-age=300
                                      access-control-allow-origin: *
                                      Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                      Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:16:43:26
                                      Start date:08/10/2024
                                      Path:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"
                                      Imagebase:0x190000
                                      File size:1'001'984 bytes
                                      MD5 hash:3C228F541D5F99E928FC4F9A0993F45C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1737881452.0000000003609000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:16:43:29
                                      Start date:08/10/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"
                                      Imagebase:0x7ff7699e0000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:16:43:29
                                      Start date:08/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:16:43:29
                                      Start date:08/10/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"
                                      Imagebase:0x710000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:16:43:29
                                      Start date:08/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:16:43:29
                                      Start date:08/10/2024
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp5126.tmp"
                                      Imagebase:0xad0000
                                      File size:187'904 bytes
                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:16:43:29
                                      Start date:08/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:16:43:29
                                      Start date:08/10/2024
                                      Path:C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\MT103 CIBC Ref No EBOTT40930537914.exe"
                                      Imagebase:0xd90000
                                      File size:1'001'984 bytes
                                      MD5 hash:3C228F541D5F99E928FC4F9A0993F45C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.4140725922.00000000033EF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.4139787806.0000000001867000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Target ID:9
                                      Start time:16:43:31
                                      Start date:08/10/2024
                                      Path:C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                      Imagebase:0x880000
                                      File size:1'001'984 bytes
                                      MD5 hash:3C228F541D5F99E928FC4F9A0993F45C
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      Reputation:low
                                      Has exited:true

                                      Target ID:10
                                      Start time:16:43:31
                                      Start date:08/10/2024
                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                      Imagebase:0x7ff693ab0000
                                      File size:496'640 bytes
                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                      Has elevated privileges:true
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:16:43:33
                                      Start date:08/10/2024
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pvTSOIBBT" /XML "C:\Users\user\AppData\Local\Temp\tmp6058.tmp"
                                      Imagebase:0xad0000
                                      File size:187'904 bytes
                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:12
                                      Start time:16:43:33
                                      Start date:08/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:13
                                      Start time:16:43:33
                                      Start date:08/10/2024
                                      Path:C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"
                                      Imagebase:0xd0000
                                      File size:1'001'984 bytes
                                      MD5 hash:3C228F541D5F99E928FC4F9A0993F45C
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:14
                                      Start time:16:43:33
                                      Start date:08/10/2024
                                      Path:C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\pvTSOIBBT.exe"
                                      Imagebase:0x820000
                                      File size:1'001'984 bytes
                                      MD5 hash:3C228F541D5F99E928FC4F9A0993F45C
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.1753117489.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:7.6%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:28
                                        Total number of Limit Nodes:4
                                        execution_graph 23975 bbdfd8 23976 bbe01e GetCurrentProcess 23975->23976 23978 bbe070 GetCurrentThread 23976->23978 23981 bbe069 23976->23981 23979 bbe0ad GetCurrentProcess 23978->23979 23980 bbe0a6 23978->23980 23982 bbe0e3 GetCurrentThreadId 23979->23982 23980->23979 23981->23978 23984 bbe13c 23982->23984 23985 bb4668 23986 bb4672 23985->23986 23988 bb4769 23985->23988 23989 bb478d 23988->23989 23993 bb4869 23989->23993 23997 bb4878 23989->23997 23995 bb4876 23993->23995 23994 bb497c 23994->23994 23995->23994 24001 bb44e0 23995->24001 23998 bb489f 23997->23998 23999 bb44e0 CreateActCtxA 23998->23999 24000 bb497c 23998->24000 23999->24000 24002 bb5908 CreateActCtxA 24001->24002 24004 bb59cb 24002->24004 24004->24004 24005 bbe220 DuplicateHandle 24006 bbe2b6 24005->24006 24007 bbbf40 24008 bbbf88 GetModuleHandleW 24007->24008 24009 bbbf82 24007->24009 24010 bbbfb5 24008->24010 24009->24008

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 563 bbdfd8-bbe067 GetCurrentProcess 567 bbe069-bbe06f 563->567 568 bbe070-bbe0a4 GetCurrentThread 563->568 567->568 569 bbe0ad-bbe0e1 GetCurrentProcess 568->569 570 bbe0a6-bbe0ac 568->570 572 bbe0ea-bbe102 569->572 573 bbe0e3-bbe0e9 569->573 570->569 576 bbe10b-bbe13a GetCurrentThreadId 572->576 573->572 577 bbe13c-bbe142 576->577 578 bbe143-bbe1a5 576->578 577->578
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00BBE056
                                        • GetCurrentThread.KERNEL32 ref: 00BBE093
                                        • GetCurrentProcess.KERNEL32 ref: 00BBE0D0
                                        • GetCurrentThreadId.KERNEL32 ref: 00BBE129
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1735551329.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 27b5defd84075bc9583920c50f03165f5f9a7c9f4f486a2776f33c644111f74f
                                        • Instruction ID: cafeff6807afd4febda83e0be0cdf36f0454a42e31ccf2e90da63290839b2aa9
                                        • Opcode Fuzzy Hash: 27b5defd84075bc9583920c50f03165f5f9a7c9f4f486a2776f33c644111f74f
                                        • Instruction Fuzzy Hash: 125145B0900609CFDB14DFAAD548BEEBBF1EB48314F208469E419A73A0D7B59984CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 818 bb58fc-bb59c9 CreateActCtxA 820 bb59cb-bb59d1 818->820 821 bb59d2-bb5a2c 818->821 820->821 828 bb5a3b-bb5a3f 821->828 829 bb5a2e-bb5a31 821->829 830 bb5a41-bb5a4d 828->830 831 bb5a50 828->831 829->828 830->831 833 bb5a51 831->833 833->833
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00BB59B9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1735551329.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: bc3af64549bdc2f554f6654cd63276e6fa53f7383f3c4fcfaf0a934eb6651d28
                                        • Instruction ID: b43beaa33dd513f4e2f54b283c521f28ddf04140e8675a42d29a9d79cbb501ca
                                        • Opcode Fuzzy Hash: bc3af64549bdc2f554f6654cd63276e6fa53f7383f3c4fcfaf0a934eb6651d28
                                        • Instruction Fuzzy Hash: 1C41E2B0C00619CFDB24CFA9C884BDDBBF5BF49304F24819AD409AB251DBB5594ACF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 834 bb44e0-bb59c9 CreateActCtxA 837 bb59cb-bb59d1 834->837 838 bb59d2-bb5a2c 834->838 837->838 845 bb5a3b-bb5a3f 838->845 846 bb5a2e-bb5a31 838->846 847 bb5a41-bb5a4d 845->847 848 bb5a50 845->848 846->845 847->848 850 bb5a51 848->850 850->850
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00BB59B9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1735551329.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: d5fdba3b82bec297cffe49fc963f71a2b5f653137d3cb87369016d3774fa291d
                                        • Instruction ID: bff41fa38563bfc13c1e7bccd0876889da7a92c04031b5d70557ed28f33072be
                                        • Opcode Fuzzy Hash: d5fdba3b82bec297cffe49fc963f71a2b5f653137d3cb87369016d3774fa291d
                                        • Instruction Fuzzy Hash: 4A41F2B0C0061DCBDB24CFA9C884BDEBBF5BF48304F2480AAD409AB251DBB56945CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 851 bbe220-bbe2b4 DuplicateHandle 852 bbe2bd-bbe2da 851->852 853 bbe2b6-bbe2bc 851->853 853->852
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BBE2A7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1735551329.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: f9c52bea991dd112e68f936f6af6ddd04bc44f64fbb9c7d9bb94f15c53720ba0
                                        • Instruction ID: 4312c99db766b9fce1e702ff8f1b714a6a94cb8e20c4dcb94bee1ebf2553c4c5
                                        • Opcode Fuzzy Hash: f9c52bea991dd112e68f936f6af6ddd04bc44f64fbb9c7d9bb94f15c53720ba0
                                        • Instruction Fuzzy Hash: 3C21E4B59002089FDB10CFAAD584ADEBBF9FB48320F14801AE914A3350C374A940CFA4

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 856 bbbf40-bbbf80 857 bbbf88-bbbfb3 GetModuleHandleW 856->857 858 bbbf82-bbbf85 856->858 859 bbbfbc-bbbfd0 857->859 860 bbbfb5-bbbfbb 857->860 858->857 860->859
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00BBBFA6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1735551329.0000000000BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 80b05944665301983545d6c012905f1d9e5f8d3e5904e1ed40c3943fb4165b86
                                        • Instruction ID: 37233ebcc8adbe40f73bac6257308db245d4ea0afa21173b99f72860b9c7d927
                                        • Opcode Fuzzy Hash: 80b05944665301983545d6c012905f1d9e5f8d3e5904e1ed40c3943fb4165b86
                                        • Instruction Fuzzy Hash: 9611E3B6C006498FCB10DF9AD844AEEFBF4EB88324F10846AD459B7250D3B5A545CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734252740.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_95d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4d20d6b2e6210944d8c1b007b071bee3874d8d86e944b21c5a01dd262108183
                                        • Instruction ID: 715c8a6f779e2d5eb389b8f7d5d84ab78c6faa4f4e059c69a7107e00bf626c58
                                        • Opcode Fuzzy Hash: d4d20d6b2e6210944d8c1b007b071bee3874d8d86e944b21c5a01dd262108183
                                        • Instruction Fuzzy Hash: FD213A71500204DFDB15DF15D9C0B26BF69FB94315F20C569DD094F2A6C33AE85AC7A2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734351955.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_96d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e93de11f992f0901152e91a354f186878184f20ed543c26db6cd46cdf35bdd1
                                        • Instruction ID: 28409b27354ad64a7591bb75ae880ea015fec6cd458db2062809bd65be9d0ca6
                                        • Opcode Fuzzy Hash: 0e93de11f992f0901152e91a354f186878184f20ed543c26db6cd46cdf35bdd1
                                        • Instruction Fuzzy Hash: DF213B71B04200DFDB05DF14D5D0B26BBA5FB84314F24C96DD8294B355C33AD846CB61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734351955.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_96d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 37c319060913a7df879c2184356c5d57a782bbfc98279b0e42757902444e00b4
                                        • Instruction ID: bee8a7eef39750778e0e68b437a53049fd46eb7950d30e9f8ead4dacc1c9d91f
                                        • Opcode Fuzzy Hash: 37c319060913a7df879c2184356c5d57a782bbfc98279b0e42757902444e00b4
                                        • Instruction Fuzzy Hash: 33210475A04240DFDB14DF14D9C4B26BFA9FB88314F24C96DE81A4B296C33BD847CAA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734351955.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_96d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2bb6adb97a9833e5b680fa73ab8f8c55c3f2515400a10d65a782b70c07f27dfc
                                        • Instruction ID: e0a0df9807eeba5b961e92576d0af33683925a428db141637dda9c16d2ef58f3
                                        • Opcode Fuzzy Hash: 2bb6adb97a9833e5b680fa73ab8f8c55c3f2515400a10d65a782b70c07f27dfc
                                        • Instruction Fuzzy Hash: 99215E755093808FDB12CF24D994B15BF71EB46314F28C5EAD8498F6A7C33A980ACB62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734252740.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_95d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction ID: 71c9f14c08fefb632ecbadb9daf1546b8868ddb37a361d36aff27b5658f12bc1
                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction Fuzzy Hash: 18110372404240CFDB16CF00D5C4B16BF72FB94324F24C2A9DC090B266C33AE85ACBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734351955.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_96d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction ID: 8432118ae69ce0044033ea4c39057e7565ce871f9738aadefd38b047e8a4aba0
                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction Fuzzy Hash: 9D11BB75A04280DFDB12CF10C5D4B15BBA1FB84314F28C6AAD8594B296C33AD84ACB61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734252740.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_95d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1dc1100313c52957a780d4b6c7c6324e247f7286d3c4e35411799de4c68b8ade
                                        • Instruction ID: accb7dbdbfd0039297166b87e0e57e2d13780308222ec7460d0129a336dbee9d
                                        • Opcode Fuzzy Hash: 1dc1100313c52957a780d4b6c7c6324e247f7286d3c4e35411799de4c68b8ade
                                        • Instruction Fuzzy Hash: 6101F7B100A3409AE730CA26DD84B67BF9CDF49325F18C92AED184A286D2799844C7B1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1734252740.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_95d000_MT103 CIBC Ref No EBOTT40930537914.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09730bc6d08a4e484925cbc6772dbb920e145210eef264c50d225e859b5d44ee
                                        • Instruction ID: 74dfa808ced216eb409113cff4fbd82e4de952a542baa06d7d188e2e7b96bca7
                                        • Opcode Fuzzy Hash: 09730bc6d08a4e484925cbc6772dbb920e145210eef264c50d225e859b5d44ee
                                        • Instruction Fuzzy Hash: 44F062714053449EE7208E16D888B62FFACEF55735F18C45AED084A286C2799844CBB1

                                        Execution Graph

                                        Execution Coverage:10.2%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:248
                                        Total number of Limit Nodes:15
                                        execution_graph 58934 2ac4668 58935 2ac4672 58934->58935 58937 2ac4769 58934->58937 58938 2ac478d 58937->58938 58942 2ac4878 58938->58942 58946 2ac4869 58938->58946 58943 2ac489f 58942->58943 58945 2ac497c 58943->58945 58950 2ac44e0 58943->58950 58947 2ac4876 58946->58947 58948 2ac497c 58947->58948 58949 2ac44e0 CreateActCtxA 58947->58949 58949->58948 58951 2ac5908 CreateActCtxA 58950->58951 58953 2ac59cb 58951->58953 58970 2acdfd8 58971 2ace01e 58970->58971 58974 2ace1b8 58971->58974 58977 2acd8e0 58974->58977 58978 2ace220 DuplicateHandle 58977->58978 58979 2ace10b 58978->58979 58850 6e3185b 58851 6e317d1 58850->58851 58855 6e346fa 58851->58855 58859 6e34708 58851->58859 58852 6e318fe 58856 6e34708 58855->58856 58863 6e334e4 58856->58863 58858 6e34765 58858->58852 58860 6e3473b 58859->58860 58861 6e334e4 ResumeThread 58860->58861 58862 6e34765 58861->58862 58862->58852 58864 6e34920 58863->58864 58865 6e34a4a 58864->58865 58867 6e34aff 58864->58867 58868 6e34b38 ResumeThread 58867->58868 58870 6e34b69 58868->58870 58870->58864 58980 6e3599a 58984 6e37560 58980->58984 59000 6e37570 58980->59000 58981 6e359a9 58985 6e37570 58984->58985 58986 6e375ae 58985->58986 59016 6e37a27 58985->59016 59024 6e37dd8 58985->59024 59031 6e37b99 58985->59031 59036 6e3799a 58985->59036 59043 6e379bb 58985->59043 59054 6e37a34 58985->59054 59059 6e37c37 58985->59059 59066 6e37930 58985->59066 59070 6e37cd1 58985->59070 59075 6e37e71 58985->59075 59080 6e37d12 58985->59080 59085 6e37be5 58985->59085 59097 6e37a06 58985->59097 58986->58981 59001 6e3758a 59000->59001 59002 6e375ae 59001->59002 59003 6e37a27 4 API calls 59001->59003 59004 6e37a06 2 API calls 59001->59004 59005 6e37be5 7 API calls 59001->59005 59006 6e37d12 2 API calls 59001->59006 59007 6e37e71 2 API calls 59001->59007 59008 6e37cd1 2 API calls 59001->59008 59009 6e37930 2 API calls 59001->59009 59010 6e37c37 4 API calls 59001->59010 59011 6e37a34 2 API calls 59001->59011 59012 6e379bb 7 API calls 59001->59012 59013 6e3799a 4 API calls 59001->59013 59014 6e37b99 2 API calls 59001->59014 59015 6e37dd8 4 API calls 59001->59015 59002->58981 59003->59002 59004->59002 59005->59002 59006->59002 59007->59002 59008->59002 59009->59002 59010->59002 59011->59002 59012->59002 59013->59002 59014->59002 59015->59002 59017 6e37a2d 59016->59017 59018 6e37a46 59016->59018 59102 6e38600 59017->59102 59107 6e385ef 59017->59107 59018->58986 59114 6e34e30 59018->59114 59118 6e34e28 59018->59118 59019 6e3824a 59025 6e379a3 59024->59025 59026 6e38373 59025->59026 59130 6e34c80 59025->59130 59134 6e34c79 59025->59134 59138 6e34d40 59025->59138 59142 6e34d39 59025->59142 59032 6e37b9f 59031->59032 59034 6e34e30 ReadProcessMemory 59032->59034 59035 6e34e28 ReadProcessMemory 59032->59035 59033 6e3824a 59034->59033 59035->59033 59037 6e379a3 59036->59037 59038 6e38373 59037->59038 59039 6e34d40 WriteProcessMemory 59037->59039 59040 6e34d39 WriteProcessMemory 59037->59040 59041 6e34c80 VirtualAllocEx 59037->59041 59042 6e34c79 VirtualAllocEx 59037->59042 59039->59037 59040->59037 59041->59037 59042->59037 59044 6e379c1 59043->59044 59053 6e34aff ResumeThread 59044->59053 59146 6e34af0 59044->59146 59150 6e34af8 59044->59150 59045 6e379a3 59046 6e38373 59045->59046 59047 6e34d40 WriteProcessMemory 59045->59047 59048 6e34d39 WriteProcessMemory 59045->59048 59049 6e34c80 VirtualAllocEx 59045->59049 59050 6e34c79 VirtualAllocEx 59045->59050 59047->59045 59048->59045 59049->59045 59050->59045 59053->59045 59055 6e37daf 59054->59055 59057 6e34d40 WriteProcessMemory 59055->59057 59058 6e34d39 WriteProcessMemory 59055->59058 59056 6e37ead 59056->58986 59057->59056 59058->59056 59061 6e379a3 59059->59061 59060 6e38373 59061->59059 59061->59060 59062 6e34d40 WriteProcessMemory 59061->59062 59063 6e34d39 WriteProcessMemory 59061->59063 59064 6e34c80 VirtualAllocEx 59061->59064 59065 6e34c79 VirtualAllocEx 59061->59065 59062->59061 59063->59061 59064->59061 59065->59061 59154 6e353c8 59066->59154 59158 6e353bd 59066->59158 59071 6e37ce9 59070->59071 59073 6e34e30 ReadProcessMemory 59071->59073 59074 6e34e28 ReadProcessMemory 59071->59074 59072 6e3824a 59073->59072 59074->59072 59076 6e37f88 59075->59076 59078 6e34ba1 Wow64SetThreadContext 59076->59078 59079 6e34ba8 Wow64SetThreadContext 59076->59079 59077 6e37fa3 59078->59077 59079->59077 59081 6e37a06 59080->59081 59082 6e37d1f 59080->59082 59083 6e34d40 WriteProcessMemory 59081->59083 59084 6e34d39 WriteProcessMemory 59081->59084 59083->59082 59084->59082 59086 6e379d2 59085->59086 59087 6e38273 59086->59087 59090 6e34af0 ResumeThread 59086->59090 59091 6e34af8 ResumeThread 59086->59091 59092 6e34aff ResumeThread 59086->59092 59087->58986 59088 6e379a3 59089 6e38373 59088->59089 59093 6e34c80 VirtualAllocEx 59088->59093 59094 6e34c79 VirtualAllocEx 59088->59094 59095 6e34d40 WriteProcessMemory 59088->59095 59096 6e34d39 WriteProcessMemory 59088->59096 59090->59088 59091->59088 59092->59088 59093->59088 59094->59088 59095->59088 59096->59088 59098 6e37a0f 59097->59098 59100 6e34d40 WriteProcessMemory 59098->59100 59101 6e34d39 WriteProcessMemory 59098->59101 59099 6e37d90 59100->59099 59101->59099 59103 6e38615 59102->59103 59122 6e34ba1 59103->59122 59126 6e34ba8 59103->59126 59104 6e3862b 59104->59018 59108 6e385c6 59107->59108 59109 6e385fa 59107->59109 59108->59018 59111 6e38648 59109->59111 59112 6e34ba1 Wow64SetThreadContext 59109->59112 59113 6e34ba8 Wow64SetThreadContext 59109->59113 59110 6e3862b 59110->59018 59111->59018 59112->59110 59113->59110 59115 6e34e7b ReadProcessMemory 59114->59115 59117 6e34ebf 59115->59117 59117->59019 59119 6e34e30 ReadProcessMemory 59118->59119 59121 6e34ebf 59119->59121 59121->59019 59123 6e34ba8 Wow64SetThreadContext 59122->59123 59125 6e34c35 59123->59125 59125->59104 59127 6e34bed Wow64SetThreadContext 59126->59127 59129 6e34c35 59127->59129 59129->59104 59131 6e34cc0 VirtualAllocEx 59130->59131 59133 6e34cfd 59131->59133 59133->59025 59135 6e34c80 VirtualAllocEx 59134->59135 59137 6e34cfd 59135->59137 59137->59025 59139 6e34d88 WriteProcessMemory 59138->59139 59141 6e34ddf 59139->59141 59141->59025 59143 6e34d40 WriteProcessMemory 59142->59143 59145 6e34ddf 59143->59145 59145->59025 59147 6e34af8 ResumeThread 59146->59147 59149 6e34b69 59147->59149 59149->59045 59151 6e34b38 ResumeThread 59150->59151 59153 6e34b69 59151->59153 59153->59045 59155 6e35451 59154->59155 59155->59155 59156 6e355b6 CreateProcessA 59155->59156 59157 6e35613 59156->59157 59157->59157 59159 6e353c8 CreateProcessA 59158->59159 59161 6e35613 59159->59161 59161->59161 58843 6e38848 58844 6e389d3 58843->58844 58846 6e3886e 58843->58846 58846->58844 58847 6e35104 58846->58847 58848 6e38ac8 PostMessageW 58847->58848 58849 6e38b34 58848->58849 58849->58846 58966 2acbf40 58967 2acbf88 GetModuleHandleW 58966->58967 58968 2acbf82 58966->58968 58969 2acbfb5 58967->58969 58968->58967 58954 51d27c0 58957 51d0b78 58954->58957 58958 51d2810 CreateWindowExW 58957->58958 58960 51d2934 58958->58960 58871 123d01c 58872 123d034 58871->58872 58873 123d08e 58872->58873 58878 51d29b8 58872->58878 58882 51d0ba4 58872->58882 58891 51d3728 58872->58891 58900 51d29c8 58872->58900 58879 51d29c8 58878->58879 58880 51d0ba4 CallWindowProcW 58879->58880 58881 51d2a0f 58880->58881 58881->58873 58884 51d0baf 58882->58884 58883 51d3799 58920 51d0ccc 58883->58920 58884->58883 58886 51d3789 58884->58886 58904 51d398c 58886->58904 58910 51d38c0 58886->58910 58915 51d38b0 58886->58915 58887 51d3797 58887->58887 58893 51d3738 58891->58893 58892 51d3799 58894 51d0ccc CallWindowProcW 58892->58894 58893->58892 58895 51d3789 58893->58895 58896 51d3797 58894->58896 58897 51d398c CallWindowProcW 58895->58897 58898 51d38b0 CallWindowProcW 58895->58898 58899 51d38c0 CallWindowProcW 58895->58899 58896->58896 58897->58896 58898->58896 58899->58896 58901 51d29ee 58900->58901 58902 51d0ba4 CallWindowProcW 58901->58902 58903 51d2a0f 58902->58903 58903->58873 58905 51d399a 58904->58905 58906 51d394a 58904->58906 58924 51d3978 58906->58924 58927 51d3968 58906->58927 58907 51d3960 58907->58887 58912 51d38d4 58910->58912 58911 51d3960 58911->58887 58913 51d3978 CallWindowProcW 58912->58913 58914 51d3968 CallWindowProcW 58912->58914 58913->58911 58914->58911 58916 51d38d4 58915->58916 58918 51d3978 CallWindowProcW 58916->58918 58919 51d3968 CallWindowProcW 58916->58919 58917 51d3960 58917->58887 58918->58917 58919->58917 58921 51d0cd7 58920->58921 58922 51d4e7a CallWindowProcW 58921->58922 58923 51d4e29 58921->58923 58922->58923 58923->58887 58925 51d3989 58924->58925 58931 51d4db1 58924->58931 58925->58907 58928 51d3978 58927->58928 58929 51d3989 58928->58929 58930 51d4db1 CallWindowProcW 58928->58930 58929->58907 58930->58929 58932 51d0ccc CallWindowProcW 58931->58932 58933 51d4dca 58932->58933 58933->58925 58961 6e319bc 58962 6e319d6 58961->58962 58964 6e346fa ResumeThread 58962->58964 58965 6e34708 ResumeThread 58962->58965 58963 6e31a19 58964->58963 58965->58963

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 294 51d7cf0-51d80e0 call 51d790c * 8 call 51d791c call 51d792c call 51d793c call 51d792c * 6 call 51d793c * 6 call 51d794c * 4 414 51d80e6-51d813b 294->414 415 51da4e2-51da512 call 51d7a8c 294->415 932 51d813e call 52bd4b9 414->932 933 51d813e call 52bd4c0 414->933 421 51da517-51da527 415->421 427 51d8141-51d8c81 call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d79cc call 51d797c call 51d798c call 51d799c call 51d79dc call 51d795c 928 51d8c84 call 52be188 427->928 929 51d8c84 call 52be198 427->929 591 51d8c87-51d9a72 call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d79ec call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c 591->415 756 51d9a78-51d9cb1 call 51d79fc call 51d797c call 51d798c call 51d799c call 51d7a0c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c 591->756 756->415 781 51d9cb7-51d9d40 call 51d79fc 756->781 781->415 786 51d9d46-51d9e40 call 51d7a1c call 51d797c call 51d798c call 51d799c 781->786 786->415 797 51d9e46-51d9f15 call 51d7a2c call 51d796c 786->797 797->415 804 51d9f1b-51d9fa0 call 51d79fc 797->804 804->415 809 51d9fa6-51da0d9 call 51d7a1c call 51d797c call 51d798c call 51d799c call 51d7a3c call 51d7a4c 804->809 926 51da0dc call 70c02b8 809->926 927 51da0dc call 70c02b3 809->927 825 51da0df-51da1b3 call 51d7a5c call 51d7a6c * 5 934 51da1b6 call 70c19e0 825->934 935 51da1b6 call 70c19f0 825->935 843 51da1b9-51da4cc call 51d7a6c * 22 call 51d797c call 51d62b8 930 51da4ce call 52b7f80 843->930 931 51da4ce call 52b7f90 843->931 923 51da4d3-51da4d5 call 51d7a7c 925 51da4da-51da4e1 923->925 926->825 927->825 928->591 929->591 930->923 931->923 932->427 933->427 934->843 935->843
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $ $ $ $ $ $$$>$>$>$>$K$K$K$K$K$K$Q$Q$Q$]$k$k$k$x${${$|$}$}$}$}$~
                                        • API String ID: 0-4232988042
                                        • Opcode ID: 20d60859c659780d2d86e53fe8bcc756a8b644bc90087c48dc839b55aece3abb
                                        • Instruction ID: 6680f99d1d9e9de6d6728ea88568d174f02c0f38ebe2f003f252851fd6cf2b48
                                        • Opcode Fuzzy Hash: 20d60859c659780d2d86e53fe8bcc756a8b644bc90087c48dc839b55aece3abb
                                        • Instruction Fuzzy Hash: 3F33F730A10715CFC725EF34C894B99B7B2FF8A304F5046AAD449AB3A1DB75AA85CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 936 51d7ce0-51d7d11 937 51d7d1b-51d7d1f call 51d790c 936->937 939 51d7d24-51d7e01 call 51d790c * 7 937->939 969 51d7e0b-51d7e0f call 51d791c 939->969 971 51d7e14-51d7e1f 969->971 973 51d7e29-51d7e2d call 51d792c 971->973 975 51d7e32-51d7fc3 call 51d793c call 51d792c * 6 call 51d793c * 6 973->975 1029 51d7fcd-51d7fd1 call 51d794c 975->1029 1031 51d7fd6-51d803b call 51d794c * 3 1029->1031 1045 51d8045 1031->1045 1046 51d804d-51d8052 1045->1046 1047 51d805c-51d806e 1046->1047 1048 51d8076-51d809e 1047->1048 1052 51d80a5-51d80c0 1048->1052 1053 51d80c6-51d80c8 1052->1053 1054 51d80d2-51d80d6 1053->1054 1055 51d80dc-51d80e0 1054->1055 1056 51d80e6-51d8127 1055->1056 1057 51da4e2-51da4f2 1055->1057 1068 51d812e-51d813b 1056->1068 1060 51da4f8-51da512 call 51d7a8c 1057->1060 1063 51da517-51da527 1060->1063 1576 51d813e call 52bd4b9 1068->1576 1577 51d813e call 52bd4c0 1068->1577 1069 51d8141-51d816c call 51d795c 1072 51d8171-51d8178 1069->1072 1073 51d817e-51d8c72 call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d797c call 51d798c call 51d799c call 51d79ac call 51d79bc call 51d796c call 51d79cc call 51d797c call 51d798c call 51d799c call 51d79dc call 51d795c 1072->1073 1232 51d8c77-51d8c81 1073->1232 1572 51d8c84 call 52be188 1232->1572 1573 51d8c84 call 52be198 1232->1573 1233 51d8c87-51d9a72 call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d79ec call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d795c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c 1233->1057 1398 51d9a78-51d9cb1 call 51d79fc call 51d797c call 51d798c call 51d799c call 51d7a0c call 51d796c call 51d797c call 51d798c call 51d799c call 51d796c 1233->1398 1398->1057 1423 51d9cb7-51d9d40 call 51d79fc 1398->1423 1423->1057 1428 51d9d46-51d9d79 1423->1428 1429 51d9d84-51d9da9 call 51d7a1c 1428->1429 1431 51d9dae-51d9e40 call 51d797c call 51d798c call 51d799c 1429->1431 1431->1057 1439 51d9e46-51d9f15 call 51d7a2c call 51d796c 1431->1439 1439->1057 1446 51d9f1b-51d9fa0 call 51d79fc 1439->1446 1446->1057 1451 51d9fa6-51da0b6 call 51d7a1c call 51d797c call 51d798c call 51d799c call 51d7a3c 1446->1451 1463 51da0bb-51da0d9 call 51d7a4c 1451->1463 1570 51da0dc call 70c02b8 1463->1570 1571 51da0dc call 70c02b3 1463->1571 1467 51da0df-51da19e call 51d7a5c call 51d7a6c * 5 1484 51da1a3-51da1b3 1467->1484 1568 51da1b6 call 70c19e0 1484->1568 1569 51da1b6 call 70c19f0 1484->1569 1485 51da1b9-51da4be call 51d7a6c * 22 call 51d797c call 51d62b8 1564 51da4ca-51da4cc 1485->1564 1574 51da4ce call 52b7f80 1564->1574 1575 51da4ce call 52b7f90 1564->1575 1565 51da4d3-51da4d5 call 51d7a7c 1567 51da4da-51da4e1 1565->1567 1568->1485 1569->1485 1570->1467 1571->1467 1572->1233 1573->1233 1574->1565 1575->1565 1576->1069 1577->1069
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $ $ $ $ $ $$$>$>$>$>$K$K$K$K$K$K$Q$Q$Q$]$k$k$k$x${${$|$}$}$}$}$~
                                        • API String ID: 0-4232988042
                                        • Opcode ID: 0d44e0cae12eee50f58a1c151a06e63a8b85fccc87d4c0074e75b102e9803a12
                                        • Instruction ID: f0a104f80cbf66d223888fc151304277540167254ddadf749533cb39ba8d9f37
                                        • Opcode Fuzzy Hash: 0d44e0cae12eee50f58a1c151a06e63a8b85fccc87d4c0074e75b102e9803a12
                                        • Instruction Fuzzy Hash: 5C33F730A10715CFC725EF34C894B99B7B2FF8A304F5046AAD449AB3A1DB75AA85CF50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b73cb907786beac31d799bd4bba4f71b7196b9c556fdf4873cc83ec3d9633bd1
                                        • Instruction ID: 8ba2c5cd83cce5c26f498d00b4e0754ee0a8603543cdc34a564fd10ebf23f2af
                                        • Opcode Fuzzy Hash: b73cb907786beac31d799bd4bba4f71b7196b9c556fdf4873cc83ec3d9633bd1
                                        • Instruction Fuzzy Hash: 6FE04F7894E328CFDBE0AEA4E44C1F8B6BCF74A212F0430A5E55D96611C2314A51CA54
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fec7b8864203ed02d69ef355950d8bc56a4708cd92a99f6ba82ca1dce4515257
                                        • Instruction ID: 154aba5827995a573bddefbdb323f8e9995f932cb6644754f15ef4f15ed4492b
                                        • Opcode Fuzzy Hash: fec7b8864203ed02d69ef355950d8bc56a4708cd92a99f6ba82ca1dce4515257
                                        • Instruction Fuzzy Hash: B2C08C32D8F3789DDBD019D4680C0F9A73CD78B062F023493E2ADA35129200811AC298

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1578 70c86d8-70c86ec 1579 70c86f3-70c86f9 1578->1579 1580 70c86fb 1579->1580 1581 70c8702-70c874b 1579->1581 1580->1581 1582 70c883c-70c884d 1580->1582 1583 70c87ac-70c87b3 1580->1583 1584 70c87fe-70c880f 1580->1584 1585 70c874e-70c875f 1580->1585 1586 70c87b8-70c87c9 1580->1586 1587 70c8887-70c888a 1580->1587 1588 70c8772-70c8783 1580->1588 1581->1585 1596 70c888b-70c889a 1582->1596 1601 70c884f-70c887c 1582->1601 1583->1579 1584->1596 1598 70c8811-70c8828 1584->1598 1585->1596 1597 70c8765-70c8770 1585->1597 1595 70c87cf-70c87e6 1586->1595 1586->1596 1588->1596 1599 70c8789-70c87a0 1588->1599 1595->1596 1608 70c87ec-70c87f9 1595->1608 1597->1579 1598->1596 1609 70c882a-70c8837 1598->1609 1599->1596 1610 70c87a6 1599->1610 1601->1587 1608->1579 1609->1579 1610->1583
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q$LR^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-4154641970
                                        • Opcode ID: 4110bc426a9833c7b7f2fbc287b44c2ea8f1386d61c3f0eb3f4bebc4fcfe07e0
                                        • Instruction ID: 6e41b21d543c2ba241f4eb25613cf2e8eaff123b530b6248b7992b14192e54da
                                        • Opcode Fuzzy Hash: 4110bc426a9833c7b7f2fbc287b44c2ea8f1386d61c3f0eb3f4bebc4fcfe07e0
                                        • Instruction Fuzzy Hash: 25415B70D14208EFCB08DFA9C69465EBBB2FF81304F24C69AD0225B7A5D7348A49CB85

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1615 70c19f0-70c1a07 1617 70c1a09-70c1a18 1615->1617 1618 70c1a6a-70c1a78 1615->1618 1617->1618 1621 70c1a1a-70c1a26 call 70c0aa8 1617->1621 1622 70c1a7a-70c1a85 call 70c0a0c 1618->1622 1623 70c1a8b-70c1a8d 1618->1623 1629 70c1a28-70c1a34 call 70c0ab8 1621->1629 1630 70c1a3a-70c1a56 1621->1630 1622->1623 1631 70c1b49-70c1bbd 1622->1631 1664 70c1a8f call 52b5f38 1623->1664 1665 70c1a8f call 52b5f48 1623->1665 1628 70c1a94-70c1aa3 1637 70c1abb-70c1abe 1628->1637 1638 70c1aa5-70c1ab4 1628->1638 1629->1630 1639 70c1abf-70c1afd 1629->1639 1643 70c1a5c-70c1a60 1630->1643 1644 70c1b04-70c1b42 1630->1644 1660 70c1bbf-70c1bc5 1631->1660 1661 70c1bd5-70c1bd6 1631->1661 1638->1637 1639->1644 1643->1618 1644->1631 1662 70c1bc9-70c1bcb 1660->1662 1663 70c1bc7 1660->1663 1662->1661 1663->1661 1664->1628 1665->1628
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Hbq$Hbq$Hbq
                                        • API String ID: 0-2297679979
                                        • Opcode ID: c9f6fe93c085f5d1ad2137ee0cb7e7853ae55b77098a2fdfde25f051cff21ebe
                                        • Instruction ID: ef58690c53f51d5637f8c551ad23302300b1ed06fe41904972b7aa74502b5f4a
                                        • Opcode Fuzzy Hash: c9f6fe93c085f5d1ad2137ee0cb7e7853ae55b77098a2fdfde25f051cff21ebe
                                        • Instruction Fuzzy Hash: 6041DEB0340604CBC759EB79851062EA7EBBFC8350B684A6CD816CB394EF39DC46C765

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1666 70c8980-70c8998 1667 70c89ba-70c89df 1666->1667 1670 70c89e4-70c8a0f 1667->1670 1671 70c89e1 1667->1671 1675 70c899a-70c899d 1670->1675 1671->1670 1676 70c899f 1675->1676 1677 70c89a6-70c89b8 1675->1677 1676->1667 1676->1677 1678 70c8a3c-70c8a7d 1676->1678 1679 70c8a1e-70c8a3a 1676->1679 1680 70c8b1f-70c8b42 1676->1680 1681 70c8a11-70c8a19 1676->1681 1682 70c8ac1-70c8b13 1676->1682 1683 70c8a82-70c8a9f 1676->1683 1684 70c8ab3-70c8abc 1676->1684 1677->1675 1678->1675 1679->1678 1699 70c8b5a-70c8b61 1680->1699 1700 70c8b44-70c8b4c 1680->1700 1681->1675 1682->1675 1692 70c8aa9-70c8aae 1683->1692 1684->1675 1692->1675 1700->1699
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q$$^q$$^q
                                        • API String ID: 0-3333519130
                                        • Opcode ID: 8c95ceae181c787ac7c76cdbf86a2f21f7f1bc9cc86037098d01b550f5fd9555
                                        • Instruction ID: 03a82d32a49a0c3409b77879f736ffc350afdc3fdfbb27c8aee08c6fd044870e
                                        • Opcode Fuzzy Hash: 8c95ceae181c787ac7c76cdbf86a2f21f7f1bc9cc86037098d01b550f5fd9555
                                        • Instruction Fuzzy Hash: 3B41EDB0B10216DFEB54DF58C845B7EB7E2FB81700F14C66EE219AB2C1D6749844CB4A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1728 52b0448-52b04a0 1769 52b04a2 call 52b0438 1728->1769 1770 52b04a2 call 52b0448 1728->1770 1732 52b04a7-52b04aa 1733 52b04ac-52b04ae 1732->1733 1734 52b0510-52b053c 1732->1734 1735 52b0543-52b054b 1733->1735 1736 52b04b4-52b04c0 1733->1736 1734->1735 1741 52b0552-52b0576 1735->1741 1736->1741 1742 52b04c6-52b04ff 1736->1742 1752 52b057e-52b05bc 1741->1752 1771 52b0501 call 52b0a28 1742->1771 1772 52b0501 call 52b0a17 1742->1772 1751 52b0506-52b050f 1757 52b05be-52b068d 1752->1757 1759 52b0693-52b06a1 1757->1759 1760 52b06aa-52b06f0 1759->1760 1761 52b06a3-52b06a9 1759->1761 1766 52b06fd 1760->1766 1767 52b06f2-52b06f5 1760->1767 1761->1760 1768 52b06fe 1766->1768 1767->1766 1768->1768 1769->1732 1770->1732 1771->1751 1772->1751
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Hbq$Hbq
                                        • API String ID: 0-4258043069
                                        • Opcode ID: a25656185043c377cd48c179aabb0ef52a8dd96d5322cfedecb919a867ae3d22
                                        • Instruction ID: 24b28595f7f0480dc366c441d499ab9a3d179d8e3e4ccc43905d602aea11ce0d
                                        • Opcode Fuzzy Hash: a25656185043c377cd48c179aabb0ef52a8dd96d5322cfedecb919a867ae3d22
                                        • Instruction Fuzzy Hash: 9B815970E103199FDB04DFA9C8986EEBBF6FF88300F24852AD409AB350DB749945CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1773 52b5f48-52b5f6a 1774 52b5f6c-52b5f72 1773->1774 1775 52b5f73-52b5f7d 1773->1775 1777 52b61b9-52b61e5 1775->1777 1778 52b5f83-52b5f9c call 52b3a04 * 2 1775->1778 1785 52b61ec-52b623d 1777->1785 1778->1785 1786 52b5fa2-52b5fc4 1778->1786 1793 52b5fc6-52b5fd4 call 52b3a14 1786->1793 1794 52b5fd5-52b5fe4 1786->1794 1799 52b6009-52b602a 1794->1799 1800 52b5fe6-52b6003 1794->1800 1807 52b607a-52b60a2 1799->1807 1808 52b602c-52b603d 1799->1808 1800->1799 1831 52b60a5 call 52b62f8 1807->1831 1832 52b60a5 call 52b6430 1807->1832 1811 52b603f-52b6057 call 52b3a24 1808->1811 1812 52b606c-52b6070 1808->1812 1819 52b6059-52b605a 1811->1819 1820 52b605c-52b606a 1811->1820 1812->1807 1815 52b60a8-52b60cd 1822 52b60cf-52b60e4 1815->1822 1823 52b6113 1815->1823 1819->1820 1820->1811 1820->1812 1822->1823 1826 52b60e6-52b6109 1822->1826 1823->1777 1826->1823 1830 52b610b 1826->1830 1830->1823 1831->1815 1832->1815
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Hbq$Hbq
                                        • API String ID: 0-4258043069
                                        • Opcode ID: 53e5decd6ecf8183861238ad19d258a6bad84b5de559b6cc2adeb68eef8fd50a
                                        • Instruction ID: 96bac59b28bc7bcca516b38a5e7a983f233c5de747bbd0d22631a751163f324c
                                        • Opcode Fuzzy Hash: 53e5decd6ecf8183861238ad19d258a6bad84b5de559b6cc2adeb68eef8fd50a
                                        • Instruction Fuzzy Hash: 28713835B101188FDB14EBA8C5549EEB7F2FF88350B2445A8D506AB3A1CB76ED42CF61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1833 70c9140-70c9153 1834 70c9155-70c9158 1833->1834 1835 70c9172-70c9179 1833->1835 1836 70c915a 1834->1836 1837 70c9161-70c9170 1834->1837 1838 70c9181-70c91c5 1835->1838 1836->1835 1836->1837 1839 70c91c7-70c91cd 1836->1839 1837->1834 1838->1834 1840 70c91cf 1839->1840 1841 70c91d1-70c91dd 1839->1841 1844 70c91df-70c91ee 1840->1844 1841->1844 1848 70c9206-70c9219 1844->1848 1849 70c91f0-70c91f6 1844->1849 1851 70c91f8 1849->1851 1852 70c91fa-70c91fc 1849->1852 1851->1848 1852->1848
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8bq$8bq
                                        • API String ID: 0-1276831224
                                        • Opcode ID: a328f3c1b2af28281ee52fb655d758c17fa47b304419d3523a67432fe413bb96
                                        • Instruction ID: 64f8e9bea62667628d8a64c1d60a30adea66e248dc913273229749146d3d7aa0
                                        • Opcode Fuzzy Hash: a328f3c1b2af28281ee52fb655d758c17fa47b304419d3523a67432fe413bb96
                                        • Instruction Fuzzy Hash: A8212470B342099FCB44DBAD9809A2E77EAEBC9311F25063DEA16D7380DE70DD048B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1874 6e353bd-6e3545d 1877 6e35496-6e354b6 1874->1877 1878 6e3545f-6e35469 1874->1878 1883 6e354b8-6e354c2 1877->1883 1884 6e354ef-6e3551e 1877->1884 1878->1877 1879 6e3546b-6e3546d 1878->1879 1881 6e35490-6e35493 1879->1881 1882 6e3546f-6e35479 1879->1882 1881->1877 1885 6e3547b 1882->1885 1886 6e3547d-6e3548c 1882->1886 1883->1884 1887 6e354c4-6e354c6 1883->1887 1894 6e35520-6e3552a 1884->1894 1895 6e35557-6e35611 CreateProcessA 1884->1895 1885->1886 1886->1886 1888 6e3548e 1886->1888 1889 6e354e9-6e354ec 1887->1889 1890 6e354c8-6e354d2 1887->1890 1888->1881 1889->1884 1892 6e354d6-6e354e5 1890->1892 1893 6e354d4 1890->1893 1892->1892 1896 6e354e7 1892->1896 1893->1892 1894->1895 1897 6e3552c-6e3552e 1894->1897 1906 6e35613-6e35619 1895->1906 1907 6e3561a-6e356a0 1895->1907 1896->1889 1899 6e35551-6e35554 1897->1899 1900 6e35530-6e3553a 1897->1900 1899->1895 1901 6e3553e-6e3554d 1900->1901 1902 6e3553c 1900->1902 1901->1901 1903 6e3554f 1901->1903 1902->1901 1903->1899 1906->1907 1917 6e356a2-6e356a6 1907->1917 1918 6e356b0-6e356b4 1907->1918 1917->1918 1919 6e356a8 1917->1919 1920 6e356b6-6e356ba 1918->1920 1921 6e356c4-6e356c8 1918->1921 1919->1918 1920->1921 1924 6e356bc 1920->1924 1922 6e356ca-6e356ce 1921->1922 1923 6e356d8-6e356dc 1921->1923 1922->1923 1925 6e356d0 1922->1925 1926 6e356ee-6e356f5 1923->1926 1927 6e356de-6e356e4 1923->1927 1924->1921 1925->1923 1928 6e356f7-6e35706 1926->1928 1929 6e3570c 1926->1929 1927->1926 1928->1929 1931 6e3570d 1929->1931 1931->1931
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E355FE
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 92ee67f2e8bb84cb7f24220710b1fe68a3fab58eff16987a95e8c3a89a9f452d
                                        • Instruction ID: 37e7a64142d5d9f90faad6ee47177578cccb6cbd6bf41a4eef89e92e99e8c4ee
                                        • Opcode Fuzzy Hash: 92ee67f2e8bb84cb7f24220710b1fe68a3fab58eff16987a95e8c3a89a9f452d
                                        • Instruction Fuzzy Hash: 79A17771D003299FDB64DF68C844BEEBBB2AF48314F1485A9E849A7280DB749981CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1932 6e353c8-6e3545d 1934 6e35496-6e354b6 1932->1934 1935 6e3545f-6e35469 1932->1935 1940 6e354b8-6e354c2 1934->1940 1941 6e354ef-6e3551e 1934->1941 1935->1934 1936 6e3546b-6e3546d 1935->1936 1938 6e35490-6e35493 1936->1938 1939 6e3546f-6e35479 1936->1939 1938->1934 1942 6e3547b 1939->1942 1943 6e3547d-6e3548c 1939->1943 1940->1941 1944 6e354c4-6e354c6 1940->1944 1951 6e35520-6e3552a 1941->1951 1952 6e35557-6e35611 CreateProcessA 1941->1952 1942->1943 1943->1943 1945 6e3548e 1943->1945 1946 6e354e9-6e354ec 1944->1946 1947 6e354c8-6e354d2 1944->1947 1945->1938 1946->1941 1949 6e354d6-6e354e5 1947->1949 1950 6e354d4 1947->1950 1949->1949 1953 6e354e7 1949->1953 1950->1949 1951->1952 1954 6e3552c-6e3552e 1951->1954 1963 6e35613-6e35619 1952->1963 1964 6e3561a-6e356a0 1952->1964 1953->1946 1956 6e35551-6e35554 1954->1956 1957 6e35530-6e3553a 1954->1957 1956->1952 1958 6e3553e-6e3554d 1957->1958 1959 6e3553c 1957->1959 1958->1958 1960 6e3554f 1958->1960 1959->1958 1960->1956 1963->1964 1974 6e356a2-6e356a6 1964->1974 1975 6e356b0-6e356b4 1964->1975 1974->1975 1976 6e356a8 1974->1976 1977 6e356b6-6e356ba 1975->1977 1978 6e356c4-6e356c8 1975->1978 1976->1975 1977->1978 1981 6e356bc 1977->1981 1979 6e356ca-6e356ce 1978->1979 1980 6e356d8-6e356dc 1978->1980 1979->1980 1982 6e356d0 1979->1982 1983 6e356ee-6e356f5 1980->1983 1984 6e356de-6e356e4 1980->1984 1981->1978 1982->1980 1985 6e356f7-6e35706 1983->1985 1986 6e3570c 1983->1986 1984->1983 1985->1986 1988 6e3570d 1986->1988 1988->1988
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E355FE
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: c4c2e045bfb853eda457d7187bc1d6d99693ed7015952ff9b6aa465a8e46e15e
                                        • Instruction ID: f27b99e77ff2c778b69fc94ccbf9fb66e77440f615daf6af32d6e55a0a6580d1
                                        • Opcode Fuzzy Hash: c4c2e045bfb853eda457d7187bc1d6d99693ed7015952ff9b6aa465a8e46e15e
                                        • Instruction Fuzzy Hash: FE916770D10329DFDB64DF68C845BAEBBB2BF48314F1485A9E849A7380DB749981CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1989 51d2804-51d2876 1990 51d2878-51d287e 1989->1990 1991 51d2881-51d2888 1989->1991 1990->1991 1992 51d288a-51d2890 1991->1992 1993 51d2893-51d28cb 1991->1993 1992->1993 1994 51d28d3-51d2932 CreateWindowExW 1993->1994 1995 51d293b-51d2973 1994->1995 1996 51d2934-51d293a 1994->1996 2000 51d2975-51d2978 1995->2000 2001 51d2980 1995->2001 1996->1995 2000->2001 2002 51d2981 2001->2002 2002->2002
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 051D2922
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 9e60f9d255d14178ff6698d28e92fcc2cccbdefd366dddc5ed84bd2e152a6898
                                        • Instruction ID: f9851484af81430bac46913a46e64019a7e6e8d5f404ee7c35047ec69b0c1657
                                        • Opcode Fuzzy Hash: 9e60f9d255d14178ff6698d28e92fcc2cccbdefd366dddc5ed84bd2e152a6898
                                        • Instruction Fuzzy Hash: D651DEB5D003199FDB14CFA9C984ADEFBF5BF48310F64812AE829AB210D7749881CF90
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 051D2922
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 00b7340c0b06510f0436fb52b0ef92f6e2f73156496da206a6f353e30ff241ba
                                        • Instruction ID: c2a4f30755b5dffed3f5e89286a4fc6a8ec759c63cc21821ff274a26f25c68b8
                                        • Opcode Fuzzy Hash: 00b7340c0b06510f0436fb52b0ef92f6e2f73156496da206a6f353e30ff241ba
                                        • Instruction Fuzzy Hash: 6251CEB5D00319AFDB14CF99C884ADEFBF5BF48310F64812AE829AB210D7749881CF91
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 051D4EA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 12577d017a655d27c5f771415f4f24a3e9d4911469668445fe4dff783b6091e2
                                        • Instruction ID: d7559ace25a4fb49cd4808a2afb1254b1e3bd6d3e56c28d104828dad8b98fe71
                                        • Opcode Fuzzy Hash: 12577d017a655d27c5f771415f4f24a3e9d4911469668445fe4dff783b6091e2
                                        • Instruction Fuzzy Hash: A541E8B5900305DFDB14CF59C488EAAFBF6FB88314F158459E519AB321D7B5A881CFA0
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02AC59B9
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1774322097.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_2ac0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 3e2d67b4f35fbb275799045565c8d10ce050fd0104d05c417d82d591bd21cb8d
                                        • Instruction ID: 68d689d6de88a5a6727c8793b0c446c7efbee9ac87079b7897e0a804625670ba
                                        • Opcode Fuzzy Hash: 3e2d67b4f35fbb275799045565c8d10ce050fd0104d05c417d82d591bd21cb8d
                                        • Instruction Fuzzy Hash: 0641E5B0C00619CFDB24CFA9C9847CEBBB5BF49314F64805AE419BB254DB756949CF90
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02AC59B9
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1774322097.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_2ac0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 201800741ed432127dad554c3a314a3b9ee0b76b515c7f2a380b4a816c7ab3e2
                                        • Instruction ID: 3b7bc60045a460957311bc6adb40239cc24ff8bdf1e954ed6c758459f220bb2e
                                        • Opcode Fuzzy Hash: 201800741ed432127dad554c3a314a3b9ee0b76b515c7f2a380b4a816c7ab3e2
                                        • Instruction Fuzzy Hash: 7741F4B0C00619CBDB24DF99C884B8DBBF5BF49314F60805AE418BB255DB756949CF90
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E34DD0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 90aeb9cce38331282bfe1b1ca6f44146eb208a6c8927abc9486cbbade888f5b2
                                        • Instruction ID: a3c1b2642227bac220cfd56adecee6325d32e9955f4a68747c89cf47bd8d5c23
                                        • Opcode Fuzzy Hash: 90aeb9cce38331282bfe1b1ca6f44146eb208a6c8927abc9486cbbade888f5b2
                                        • Instruction Fuzzy Hash: 2A2135B59003199FCB10DFA9C885BDEBBF4FF48324F50842AE959A7250C7789994CBA4
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E34DD0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: a6a4de3b30de97fc9ae82890c9c3813acd0c16fd9bf7c3cccd6c2eaf19d337e7
                                        • Instruction ID: 1ee6286b3320c77b4213b79a0de0fa60fafa5b30ed0a26beff332ee1e3b257e9
                                        • Opcode Fuzzy Hash: a6a4de3b30de97fc9ae82890c9c3813acd0c16fd9bf7c3cccd6c2eaf19d337e7
                                        • Instruction Fuzzy Hash: C62113B19003599FCB10DFA9C885BDEBBF5FF48324F50842AE958A7250C7789954CBA4
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E34EB0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 08f5e86ac9a4a6a5602b028b8a1d6804dab7dc4c1a36dde84809e378dbb7fa85
                                        • Instruction ID: b68c0a40924d69bd17325be7ecaf322740e8bc2042fc1a9ecbaca1cbfc8af777
                                        • Opcode Fuzzy Hash: 08f5e86ac9a4a6a5602b028b8a1d6804dab7dc4c1a36dde84809e378dbb7fa85
                                        • Instruction Fuzzy Hash: 8F2139B18003599FCB10DFAAC885ADEFBF5FF48310F10842AE558A7250C7349545CBA4
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E34C26
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 97cf070ee0071cf5dcb0cf7d7e85ab0ae5ba4b17b42454b535850feadbbe2572
                                        • Instruction ID: a5f27b00afd45154f7c7e65ee8c6f8766738d984f5f3f70929187ce1d5b854fb
                                        • Opcode Fuzzy Hash: 97cf070ee0071cf5dcb0cf7d7e85ab0ae5ba4b17b42454b535850feadbbe2572
                                        • Instruction Fuzzy Hash: FC215971D003198FDB10DFAAC4857EEBBF4EF88324F10842AD459A7241C7789985CFA4
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02ACE1E6,?,?,?,?,?), ref: 02ACE2A7
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1774322097.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_2ac0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: d42312c489c8e7e15d13123b8386a31bbaac8291cd12664fe94708fbda1af5a7
                                        • Instruction ID: c8f3d45713eb3e8dc9260e81d5c3f6ca63a8dfa7cea6a9a6e7d20e5ae155838b
                                        • Opcode Fuzzy Hash: d42312c489c8e7e15d13123b8386a31bbaac8291cd12664fe94708fbda1af5a7
                                        • Instruction Fuzzy Hash: F621E3B5900248EFDB10CF9AD584ADEFBF8EB48320F24845AE914A7350D378A954CFA5
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E34EB0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 688ddc1ee5acff89099f579aa7d109d3f1bf656186928db5d9cd8aa787c7ea70
                                        • Instruction ID: ab3a0f0fd0f9fc16afac47fce125826dc9a988b3b84b6bcef9502ece096e707a
                                        • Opcode Fuzzy Hash: 688ddc1ee5acff89099f579aa7d109d3f1bf656186928db5d9cd8aa787c7ea70
                                        • Instruction Fuzzy Hash: 9621E6B19003599FCB10DFAAC885ADEBBF5FF48320F10842AE559A7250D7789944CBA5
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E34C26
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 143c5465f266214df0fc150ffff6418f84acfa62388f991789be81637cdf8dd4
                                        • Instruction ID: a9501b9f6416072fde88b61e5147ab157bc92bc2589dc139fd492093cf48c5af
                                        • Opcode Fuzzy Hash: 143c5465f266214df0fc150ffff6418f84acfa62388f991789be81637cdf8dd4
                                        • Instruction Fuzzy Hash: 4A2129B1D003198FDB10DFAAC4857EEBBF4EF88324F148429D459A7241D7789985CFA5
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E34CEE
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: ff3685b609821e9d06f0671f91cf05323f287d922d46925aa25ae338dfa9b6e6
                                        • Instruction ID: 98f9196131f26b08d02d9f45f093e2a5312595cf3dd0a9182d4af6f95b29ff4c
                                        • Opcode Fuzzy Hash: ff3685b609821e9d06f0671f91cf05323f287d922d46925aa25ae338dfa9b6e6
                                        • Instruction Fuzzy Hash: FE115971900249DFCB10DFAAC845BDEBFF5EF88324F14841AE955A7250C775A554CFA0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: ddb72bb3a8ce7fc6e87768300b75464584b9012ee6b67b86e329885b62c37c2c
                                        • Instruction ID: 10d3fe3db71aa25bc8bff3f97a3ad653b3f1af40a749efded826a22eccc7462f
                                        • Opcode Fuzzy Hash: ddb72bb3a8ce7fc6e87768300b75464584b9012ee6b67b86e329885b62c37c2c
                                        • Instruction Fuzzy Hash: 701158B19003498BCB10DFAAC4497DEFFF4EF89324F24841AD459A7250C775A984CB94
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E34CEE
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 627af016e2b4ca9307347cf4165a61ba1a91ca44bcd1cbfcdaa20a2df35730db
                                        • Instruction ID: b0f7c1a186e25d303bbd00db9313ece25f097e172a2d207ae8ef611648c9ba55
                                        • Opcode Fuzzy Hash: 627af016e2b4ca9307347cf4165a61ba1a91ca44bcd1cbfcdaa20a2df35730db
                                        • Instruction Fuzzy Hash: 24113772900249DFCB10DFAAC845BDEBFF5EF88324F108819E959A7250C775A544CFA5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 46f29a39d2a66bcc782ccd4c00f910cca8b646c86b025ce7dbcbfd489cff4262
                                        • Instruction ID: 53a83834294b51748afe971edc4efe6d15d93a9a2a0d5c309fd5696bd5faf0da
                                        • Opcode Fuzzy Hash: 46f29a39d2a66bcc782ccd4c00f910cca8b646c86b025ce7dbcbfd489cff4262
                                        • Instruction Fuzzy Hash: DB1128B19003588BCB10DFAAC4457DEFBF5AB88324F208419D459A7250C775A544CB95
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E38B25
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 153545918eef81c89f565e017d4f689086414351dacf1cad4cd8b28bb4b350f8
                                        • Instruction ID: 7d9c8a89cb89355caac5b7c7bcaaf208cc387d319199c00571ed4569f7e3996a
                                        • Opcode Fuzzy Hash: 153545918eef81c89f565e017d4f689086414351dacf1cad4cd8b28bb4b350f8
                                        • Instruction Fuzzy Hash: D611F5B58003499FDB50DF9AD489BDEFFF8EB58324F20845AE558A7200C375A544CFA5
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E38B25
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: e61de431cf7e7ec9c9d3625b2d1bf03480fc1bf1632b4281f297a63a0576fc02
                                        • Instruction ID: 0288c24fc4d2efb6f39eaa2fc8d4bdec9dc5350d3ed66763c74e272407647878
                                        • Opcode Fuzzy Hash: e61de431cf7e7ec9c9d3625b2d1bf03480fc1bf1632b4281f297a63a0576fc02
                                        • Instruction Fuzzy Hash: C41103B5800359DFDB50DF9AC889BDEBFF8EB58324F108419E958A7240C375A984CFA5
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 02ACBFA6
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1774322097.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_2ac0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 0e66a275ad2f9a81ff3ee6e67c6d713e5a52d8de19312a0695e2391dd769c658
                                        • Instruction ID: 393e22cd6678cc33ebabacc451deb82847982a5bc51a454af2198a22e26fc094
                                        • Opcode Fuzzy Hash: 0e66a275ad2f9a81ff3ee6e67c6d713e5a52d8de19312a0695e2391dd769c658
                                        • Instruction Fuzzy Hash: 171110B5C002498FCB10DF9AC444ADEFBF4AB89324F20842AD818B7310D379A545CFA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 072ed296ce20d6bde52f5afc73b410cb95035d12f24fcbbf65db9d707085bdd5
                                        • Instruction ID: b6d75d5ff710d96236da097852fd27a8279c5a7480cec8a7d2f476919854b51f
                                        • Opcode Fuzzy Hash: 072ed296ce20d6bde52f5afc73b410cb95035d12f24fcbbf65db9d707085bdd5
                                        • Instruction Fuzzy Hash: 821133B19043598FCB10DFA9C4457EEFFF0AF88324F24886EC059AB250CB799584CB95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (bq
                                        • API String ID: 0-149360118
                                        • Opcode ID: 5b0b8729dd8057cf69de1cd84fb5934e792fc3f4c9fee86651f315e4eebc13c5
                                        • Instruction ID: 9899b93d02759a2b5d07e8754f1107115418fa304fc21824d43d6082b42eb1ee
                                        • Opcode Fuzzy Hash: 5b0b8729dd8057cf69de1cd84fb5934e792fc3f4c9fee86651f315e4eebc13c5
                                        • Instruction Fuzzy Hash: 77A1BCB1E103499FCB05DFA8C954ADEBBF6EF89300F24816AE405BB351DB74A845CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: r
                                        • API String ID: 0-1812594589
                                        • Opcode ID: bd6f208eea4924d41f8bb2a9e4114af01ecc4e5b7aaa61f2a86a5c3ca7452bf8
                                        • Instruction ID: 30a3d7cc71e1e6528fc6522a6f7d144ecc3daab0cd472bcf47e91efe8d0a4616
                                        • Opcode Fuzzy Hash: bd6f208eea4924d41f8bb2a9e4114af01ecc4e5b7aaa61f2a86a5c3ca7452bf8
                                        • Instruction Fuzzy Hash: B7714AB591910ADFC704DF58E5848ADF7BBFF0A301B10A648E41A9B246C734F982CF52
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te^q
                                        • API String ID: 0-671973202
                                        • Opcode ID: db167dbe6c1afa612a9c7dad7cf1f06f17b5c35a517cecf5c3aee753e0d04c67
                                        • Instruction ID: a7878ca2f61206c17c4dcd346cdddb23c4eac31fab3f52d7797e75416cfad43c
                                        • Opcode Fuzzy Hash: db167dbe6c1afa612a9c7dad7cf1f06f17b5c35a517cecf5c3aee753e0d04c67
                                        • Instruction Fuzzy Hash: CD51AE71B102068FCB05DB7998488BEBBF6FFC83607248929E459C7391EB70DD058750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te^q
                                        • API String ID: 0-671973202
                                        • Opcode ID: 729fe7642efcad50328497016a7820c4434282caf42467e48da206175db1db8a
                                        • Instruction ID: bf3d005621648c93a244892df4d48e3bcca17bcab4be736ab9a1d7b6033126d2
                                        • Opcode Fuzzy Hash: 729fe7642efcad50328497016a7820c4434282caf42467e48da206175db1db8a
                                        • Instruction Fuzzy Hash: 644107B4E15218CFDB08CFA9C9446EEBBF6BF8A300F10952DD41AAB355DB745905CB50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te^q
                                        • API String ID: 0-671973202
                                        • Opcode ID: 6a5e4d72572eb74044f1327894acfcf64761572fe10a33933fa58049ae5c09dd
                                        • Instruction ID: 54b320a78571fb68dd1cd6a75e026ea06ddee1cda00ec042f2eeb788880ab811
                                        • Opcode Fuzzy Hash: 6a5e4d72572eb74044f1327894acfcf64761572fe10a33933fa58049ae5c09dd
                                        • Instruction Fuzzy Hash: 5D3139B4E19258CFCB18CFA6D9446EEBBF6BF8A300F10922DD019AB355DB745906CB50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (bq
                                        • API String ID: 0-149360118
                                        • Opcode ID: 37a28e2da30b2644df1f639ddf8f7b7b59ecc5ff67eccfe3e319a41a1f8c22c9
                                        • Instruction ID: 3d37acdf2dbef4809f1c189736b4ab4f98ef7af433c9a9b7391f807f93ceb994
                                        • Opcode Fuzzy Hash: 37a28e2da30b2644df1f639ddf8f7b7b59ecc5ff67eccfe3e319a41a1f8c22c9
                                        • Instruction Fuzzy Hash: 7521CC75B142458FD711DF68C480A9EBBF5FF49310F2440AAD009AB351DB76DD01CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: p
                                        • API String ID: 0-2181537457
                                        • Opcode ID: f48ac263481829f7acae61f038859c47959d01200be1e159e527374f0c11d24f
                                        • Instruction ID: fa2489d125ddc5066dca30ce36492cf157bff8bf5b28fd8e422dbfa049bf232e
                                        • Opcode Fuzzy Hash: f48ac263481829f7acae61f038859c47959d01200be1e159e527374f0c11d24f
                                        • Instruction Fuzzy Hash: 6221BF396106419FDB10EF29C5C4EAA7BB7FF89754F14402EE68A87652CB70E841DB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8bq
                                        • API String ID: 0-187764589
                                        • Opcode ID: 7b16754f609eaf4b0c86fb1df6f039ea208235f8eda95a5c0d74bcfa8432b331
                                        • Instruction ID: 5fe7d516e458c2894bf3612ca89a5bc90c1a03e6dcf08e42caba22d7f5ad62cd
                                        • Opcode Fuzzy Hash: 7b16754f609eaf4b0c86fb1df6f039ea208235f8eda95a5c0d74bcfa8432b331
                                        • Instruction Fuzzy Hash: 112154B0B342418FCB44DF789809A6E77F6EB89311F15063AEA12D7380DA309D088B91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q
                                        • API String ID: 0-1614139903
                                        • Opcode ID: c4ea352af3600f900a1ab34b44c5c11e774025062e4a9d064172ec1dd921c91a
                                        • Instruction ID: 2ebe8bbdae47be14b99fa3297e3cfa2c566a500e8d5bfa6a5255ab42d963795a
                                        • Opcode Fuzzy Hash: c4ea352af3600f900a1ab34b44c5c11e774025062e4a9d064172ec1dd921c91a
                                        • Instruction Fuzzy Hash: FF110334A1A3859FCB46EB78EA595CD7FB0FF06204B1449EAC449CB3A3DA315A45C742
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te^q
                                        • API String ID: 0-671973202
                                        • Opcode ID: 61c523f5dc74a242002a58388716e5a23bd7cf5b7b461b63ecc628c4e6b375d2
                                        • Instruction ID: a858c1230cd4fdbae2b354e0712eb74161e790c92358074bc5a3b002dec1f81f
                                        • Opcode Fuzzy Hash: 61c523f5dc74a242002a58388716e5a23bd7cf5b7b461b63ecc628c4e6b375d2
                                        • Instruction Fuzzy Hash: 9C115131B0020A8BDB44EBB999106FFB7F6AFC8350B10403AC509E7244EF728E05CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te^q
                                        • API String ID: 0-671973202
                                        • Opcode ID: 226f609542dde74169bb0bb5311076bd840e22ae47481d627bae2ddf69088206
                                        • Instruction ID: 62d461a0f2c18e7cb0ef68d1a1afbe3a8b906f3a6d9e8ee88ac2ea91d3744623
                                        • Opcode Fuzzy Hash: 226f609542dde74169bb0bb5311076bd840e22ae47481d627bae2ddf69088206
                                        • Instruction Fuzzy Hash: 6F118D75E002199FCB08DFE8D9849ADBBB2FB88310F208129E915AB354C6316916CF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q
                                        • API String ID: 0-1614139903
                                        • Opcode ID: 5357c21c25ce95597219963d59678635fcc97ba310b94792030d377f155f3ba8
                                        • Instruction ID: db3b96f6be4efe80025a56dc5eef56c5e1ea43722149c20c573edc043c7541cf
                                        • Opcode Fuzzy Hash: 5357c21c25ce95597219963d59678635fcc97ba310b94792030d377f155f3ba8
                                        • Instruction Fuzzy Hash: EDF01934A11209AFCB85EFB8EA5959DBFB1FF48205B1045A8D409E7354DF305E498B51
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: af12f701552ecef668a42eb357ef83024a126828f1ef0f821542fb566c1ff94d
                                        • Instruction ID: 6e03976c994eb1d4bab2e98158f7231a3c6a900012614ea6056ef7e2b7e7630e
                                        • Opcode Fuzzy Hash: af12f701552ecef668a42eb357ef83024a126828f1ef0f821542fb566c1ff94d
                                        • Instruction Fuzzy Hash: 4862DCB1F11B428BE7749B6495987EDBAA1FF85340F148D1ED0EECB680DBB4A481DB01
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 28471c2132eeaa1e64beabbeebae4474d0e42f597afdaaa6ad40d2a95216daa0
                                        • Instruction ID: 992a89ad7cc7e437bf1ce6433bdefd0d4d9ad7e6af0283da71e3b812e93949bd
                                        • Opcode Fuzzy Hash: 28471c2132eeaa1e64beabbeebae4474d0e42f597afdaaa6ad40d2a95216daa0
                                        • Instruction Fuzzy Hash: 8742F270D1061DCFCB15EFA8C8456DCBBB1BF49300F618699D5497B265EB30AAA8CF81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bbf46149866aa58c18f5eccbfe450f252ba5a6749bd98bad149ba2d4a6db5b66
                                        • Instruction ID: c76bdce53a1172d8382357b0361a0cf0ff33147519ae158a226903ed8a5ac2d7
                                        • Opcode Fuzzy Hash: bbf46149866aa58c18f5eccbfe450f252ba5a6749bd98bad149ba2d4a6db5b66
                                        • Instruction Fuzzy Hash: FE42F270D1061DCFCB14EFA8C8446DCBBB1BF49300F618699D5497B264EB30AAA9CF81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 730762fb152890f252fbea049221dc58e59b45ebf60193ce21ffd68dc4fa5033
                                        • Instruction ID: 72ad33684fd2c6e986b8ee8a8d4db5c9db7ecbc32feb2c9b3fa2ead54ec0676e
                                        • Opcode Fuzzy Hash: 730762fb152890f252fbea049221dc58e59b45ebf60193ce21ffd68dc4fa5033
                                        • Instruction Fuzzy Hash: 6AB19AB1A10209DFDB25DFA5C9406AEFBB2FF88300F20866DC505AB245DB319959CB52
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d26e8a9ca815d12e8af517b97c78375b10702ab0cef36536d38c1ecb026b099f
                                        • Instruction ID: 4fc1f0ca6da7ca4aaa0176c19532cfd0d0d40d03abdc70ad34afc00cc9388a1a
                                        • Opcode Fuzzy Hash: d26e8a9ca815d12e8af517b97c78375b10702ab0cef36536d38c1ecb026b099f
                                        • Instruction Fuzzy Hash: 25B14A30A202159FDB04EF69C594AADBBF6FF88340F1545A9E506EB362CB71DC41CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ccdbecb0deedeb0198320349aa9b21f4acaa9ba3ed5d740a7b11681f3d092c1e
                                        • Instruction ID: aaaac4ba3adaa62e0fc2b5fe499f53ca5cebcafa1fbe3dfaf42398dd62f071ea
                                        • Opcode Fuzzy Hash: ccdbecb0deedeb0198320349aa9b21f4acaa9ba3ed5d740a7b11681f3d092c1e
                                        • Instruction Fuzzy Hash: 2281E434760610CFDB04EB28D598AA977F6FF89744B1541A9E506CB375DB72EC01CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0df5f5ae8d3b280a6ff3e9d631f0e2dbaefd608b89adbbf4dadee8fafc994ee4
                                        • Instruction ID: 4a449ec48a3b2a75661b07e4e39175aeca936959a74c260b73d951033c5362ca
                                        • Opcode Fuzzy Hash: 0df5f5ae8d3b280a6ff3e9d631f0e2dbaefd608b89adbbf4dadee8fafc994ee4
                                        • Instruction Fuzzy Hash: B581C030A10B4A8FCB10EF78C4146EABBB6FF95300F10C669D559AB351EB71EA85C790
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 033b4d708025ab7ea3be7abc823baa3a29ef511b211935b87b89ea0ec5fe0ebd
                                        • Instruction ID: 2243b0a6d5ac8b8ab1512ca4081939b8d8b5f42160ccb800a38af2f8c4ce399a
                                        • Opcode Fuzzy Hash: 033b4d708025ab7ea3be7abc823baa3a29ef511b211935b87b89ea0ec5fe0ebd
                                        • Instruction Fuzzy Hash: 0F81A0B0A1055ADFCB15EF64D5986ECBFF0FF45300F114269E455A72A4EB30D964CB80
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21ad41e661b697097892930e72284587351eff38ea9c777ebe61b1e6a522197f
                                        • Instruction ID: 904ad2da9666f8b8850b6941000b789002a0c97a5f4a6be312320e2c9463a867
                                        • Opcode Fuzzy Hash: 21ad41e661b697097892930e72284587351eff38ea9c777ebe61b1e6a522197f
                                        • Instruction Fuzzy Hash: 25615A703206419FDB18EB798854B6EB6A7FFC8340F54882DC11A9B354DFB5A846CBA4
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65d660a1b9bd23fa4404dca2b44d83baea05a57d4a2ff5d0ca91dbbb308682cf
                                        • Instruction ID: 0bc2f192921482de6afa570c4cae24a951d04baafed8605f071cf27914a77725
                                        • Opcode Fuzzy Hash: 65d660a1b9bd23fa4404dca2b44d83baea05a57d4a2ff5d0ca91dbbb308682cf
                                        • Instruction Fuzzy Hash: BB6169703206419FDB18EB798854B6EB6A7FFC8340F54882DC11A9B354CFB5A846CBA4
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c9904102fbe82bc9d01bf1e40ad143c1ef27382620bd878f5450aaa4c18e797
                                        • Instruction ID: bd6142f9bf3d7f4af87815035764b04d5a67d392eee49940f89f617f68eb733d
                                        • Opcode Fuzzy Hash: 3c9904102fbe82bc9d01bf1e40ad143c1ef27382620bd878f5450aaa4c18e797
                                        • Instruction Fuzzy Hash: A3716E70B1020A8FEB14DF68D4986EDBBF2FF88340F148569E516BB390EB749945CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05ec5aba1858be5111343b0be9438867adf46da02906350a150913e6919b03ed
                                        • Instruction ID: 74ff6d18864aace8ebde109f057d9a81cf2e8d466a8ae9c9b23f42e036ec40e4
                                        • Opcode Fuzzy Hash: 05ec5aba1858be5111343b0be9438867adf46da02906350a150913e6919b03ed
                                        • Instruction Fuzzy Hash: 1A5171B0F1510D9BDB04DFA9C8817BEBBB2FF85300F10866AE565A73C5CB3899418B91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eb9da33399cd8da77bf06562de1aa1ffb83b0743d1317eb520432894c83b3a22
                                        • Instruction ID: bfcfb43634766c6919b864e8d9eb3b9165f7daecab99358816f83ec7c2490dea
                                        • Opcode Fuzzy Hash: eb9da33399cd8da77bf06562de1aa1ffb83b0743d1317eb520432894c83b3a22
                                        • Instruction Fuzzy Hash: 4C71AE74A11209AFDB14DF68D484DAEBBB2FF48754B114098F905AB362DB71EC81CF90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d84cb27acdd9dfd6bfe8b8473a79812f402a921af970ba31458bc2c4caf8d2af
                                        • Instruction ID: 0681708eaaea52476b60eca9fe568c55ae4e467f3fa984aa8cc78f2ef2ccb856
                                        • Opcode Fuzzy Hash: d84cb27acdd9dfd6bfe8b8473a79812f402a921af970ba31458bc2c4caf8d2af
                                        • Instruction Fuzzy Hash: E65170B0F152099BDB04DFA9C9817BEBBB2FF85300F10866AE555A73C4CB389941CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e706364078b0614338a16d6045d3fc0bdb3d0d2617839a4c12a60ebdc176d5f6
                                        • Instruction ID: 571fd7696520dd0c64788c65473a41632e68d11ce71883daca9a50a1d523d5ad
                                        • Opcode Fuzzy Hash: e706364078b0614338a16d6045d3fc0bdb3d0d2617839a4c12a60ebdc176d5f6
                                        • Instruction Fuzzy Hash: AE517E307202058FEB14EF69C584BEEB7BAAF88340F154569D51ADB3A1CBB5EC45CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: af502fa3e7dad44d2030865f130f22ddfc3f26b276b4123a0bf96bf00a4295b6
                                        • Instruction ID: 8d292ddb7e81b4857f6d5fafe6e245efb53bff7d7a2270e7786552981679238f
                                        • Opcode Fuzzy Hash: af502fa3e7dad44d2030865f130f22ddfc3f26b276b4123a0bf96bf00a4295b6
                                        • Instruction Fuzzy Hash: DC51F331B042149FD700AB78D455AADBBB2BF89300F14C9A9ED91AF399CF346D49CB81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 608b87128d9e8148f37862520d4f1a209810cf05cc5f8351ce685d092168ee5e
                                        • Instruction ID: 441d28d5ea8a088106eab2244327f5960b729f09e4d5e391b1e8fa74cc78bcf1
                                        • Opcode Fuzzy Hash: 608b87128d9e8148f37862520d4f1a209810cf05cc5f8351ce685d092168ee5e
                                        • Instruction Fuzzy Hash: 1C519E32A1050A9FDF00CFA4D844AEEB7B6FF45750F05846AE909EB261D775E90ACB80
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8de135437f7164a1348cf56bd211f99227d1d3e646d371d129b7c7c5515abb2c
                                        • Instruction ID: c98f2ad6c5424b180c986bb25378c126c249eeb524ae2a83857b2fdd46f3b017
                                        • Opcode Fuzzy Hash: 8de135437f7164a1348cf56bd211f99227d1d3e646d371d129b7c7c5515abb2c
                                        • Instruction Fuzzy Hash: 4E51D431B002149FD704AB78D455AAEBBB2BF88300F14C9A8ED516F399CF74AD49CB81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f06e3a188f21158557ff11049c7af03f26eafd8651b3a9c4e3bcb5e46eb53713
                                        • Instruction ID: eee14e0f974b1e95137ce6ad63a51313638604ed79614be37ff6534017355b1e
                                        • Opcode Fuzzy Hash: f06e3a188f21158557ff11049c7af03f26eafd8651b3a9c4e3bcb5e46eb53713
                                        • Instruction Fuzzy Hash: 88514C71E102499FDF15DFA9D848AEFBBF9EF88350F10842AD455E3350DB7499058B90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f487e68764e0b80b2119d5fa31cea0ca4f8f9d2bb64b77af20b3a79f79e22bf6
                                        • Instruction ID: d3e464179e86a70e4075d99582869b353f6ed380e90a20c7ce61f317c68b1f45
                                        • Opcode Fuzzy Hash: f487e68764e0b80b2119d5fa31cea0ca4f8f9d2bb64b77af20b3a79f79e22bf6
                                        • Instruction Fuzzy Hash: B7516C71A10209DFDB14EFA8D854AADBBF2FF89310F1482A9E445BB3A0DB70D941CB51
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a2121ee64591ff38810c8e5f44955835cba2bc19091ca571ce52ff7f288001e5
                                        • Instruction ID: d829e7a2ed8a2eaef130106aa11bdf6637ab04ebf85b4b705cf9d63149b17e16
                                        • Opcode Fuzzy Hash: a2121ee64591ff38810c8e5f44955835cba2bc19091ca571ce52ff7f288001e5
                                        • Instruction Fuzzy Hash: A6517C307202069FDB19EB68C584AEDB7BAAF88340F25416DD50ADB361CBB5EC41CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6bbcbcf8027928b5b49674e84ba45c05f448d901352c51011705cadbfe3a7d1e
                                        • Instruction ID: 17bbc404ee64f000ced5e12f17872c5499051a04fecb9763a95664c7fda2d299
                                        • Opcode Fuzzy Hash: 6bbcbcf8027928b5b49674e84ba45c05f448d901352c51011705cadbfe3a7d1e
                                        • Instruction Fuzzy Hash: 9431B030E22218DFDB14DFB0E5985EDBBB2FF85300F208569E45163655CB719865CB50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 590f1b282c127e4e9038d79c222c552f0b0a1c0a460c0fa3ca75cf933261b16e
                                        • Instruction ID: f37983fd8769d59e830de73fa0cf72460cf7dbc5d826237933e7c3bf8599d9ef
                                        • Opcode Fuzzy Hash: 590f1b282c127e4e9038d79c222c552f0b0a1c0a460c0fa3ca75cf933261b16e
                                        • Instruction Fuzzy Hash: 214115B4E09209CFDB48CFAAD4446FEBBF6AB8D300F14D269E41AA7251DB345A41CB54
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ecd9b6fce7f17df7a602abfab221e0f9c72ebb01d991d3cd419df8028f77d82a
                                        • Instruction ID: 1e4683f82664552f2a2b4d3aa9d33b9b355ef0ef62f49cb427845287316f9680
                                        • Opcode Fuzzy Hash: ecd9b6fce7f17df7a602abfab221e0f9c72ebb01d991d3cd419df8028f77d82a
                                        • Instruction Fuzzy Hash: 854104F0E142969FCB41EFA4C9B97AEBFF0BB45240F15436EF512A7295E63089008B95
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a69729a7ebf111aeb94522aece610f0572fbf443aa61cf0bc92bfa9ce52f5b29
                                        • Instruction ID: edb0ccc3468e9f2cdca47e33dede7189fca26f7fb573fff74d5f2b450438fca2
                                        • Opcode Fuzzy Hash: a69729a7ebf111aeb94522aece610f0572fbf443aa61cf0bc92bfa9ce52f5b29
                                        • Instruction Fuzzy Hash: 98413A30B242598FDB14DB69C994EADBBFABF49780F1440A9E50AEB361CA71D844CB10
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0f80a38775778cbd552cd7547138ab56ed669cee3d1b5cef3e4754c356ccb104
                                        • Instruction ID: 6b0bea1bde2da31c7929df3f0224e335b9732fec0c9ce72a967376e99722512b
                                        • Opcode Fuzzy Hash: 0f80a38775778cbd552cd7547138ab56ed669cee3d1b5cef3e4754c356ccb104
                                        • Instruction Fuzzy Hash: E641D1F0E1419B9FDB41EFA4C8A97AEBFF0BB45300F14466DF512A7294FA31C9108A94
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a1ea592c599cc750ac30181e93fe0d096b5c23ff1c4964305bed9acfb3cc9fab
                                        • Instruction ID: 85648680f6c6525b6a960f1c0b81d0dde631ca508b630984d8d1c1e837c856f5
                                        • Opcode Fuzzy Hash: a1ea592c599cc750ac30181e93fe0d096b5c23ff1c4964305bed9acfb3cc9fab
                                        • Instruction Fuzzy Hash: CA416E70A242158FDB04EFB8C854AEEB7F5FF84340F118569E809AB365EBB0D944CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d3ec6ed98a4abdbb2e6c4e54f5ec04ce3f19c4c6ed5ba79e7b40b6c7bd15566
                                        • Instruction ID: 20b355e236cb105790d3784f2ff752ec6eb3bc2c886bc71c8869fe58e483553c
                                        • Opcode Fuzzy Hash: 0d3ec6ed98a4abdbb2e6c4e54f5ec04ce3f19c4c6ed5ba79e7b40b6c7bd15566
                                        • Instruction Fuzzy Hash: DB51B278A10208AFDB14DF68D494DAEBBB2FF48760B114498F905AB361DB71EC81CF50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c2771926b391d4f34f95353ee604ba3dc9c4be5116ad0f6138b96301ca7dbc48
                                        • Instruction ID: f53a32504601e0f087cd89cea7e3f55e01eedfc948e4ea71ee0f05bfc82515e7
                                        • Opcode Fuzzy Hash: c2771926b391d4f34f95353ee604ba3dc9c4be5116ad0f6138b96301ca7dbc48
                                        • Instruction Fuzzy Hash: 81410634B502198FDB14EF68C894BDDB7B2BF48315F114068E906AB3A1DB79E901CFA0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 90124107c01c7dd7c75ff4e46ebb9f258a65b909649c9b1ea8b2884c7cbaa595
                                        • Instruction ID: 9aebf6ef4300b7daed323e50b47c1b0ea6f97e5cf3a3ff93c479c83daf633e89
                                        • Opcode Fuzzy Hash: 90124107c01c7dd7c75ff4e46ebb9f258a65b909649c9b1ea8b2884c7cbaa595
                                        • Instruction Fuzzy Hash: 3E413D71A11209DFDB54EFA8D854A9DB7F2FF89310F1486A9E441BB3A0DB70A941CB50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1acb307001097d1bf2c489082b0f12c8d367bad2edb1b3d57f73eaced1b82bd7
                                        • Instruction ID: 20664caf56364f37c11a2f76103b82673dc5b1f3e681a31cbd5f5ed73040c1bc
                                        • Opcode Fuzzy Hash: 1acb307001097d1bf2c489082b0f12c8d367bad2edb1b3d57f73eaced1b82bd7
                                        • Instruction Fuzzy Hash: 8C419D78A10209AFDB04DF68D498DADBBB2FF49760B114498F9069B362DB71EC81CF50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bede3cd86598c87301f23e9ed7b99f16a3a5d1437e84f0787eb65d5f9e35a03c
                                        • Instruction ID: 5eab4086d58a165ccbb1523ba048696cbed973cdcdd71925b8158708a5e45bc1
                                        • Opcode Fuzzy Hash: bede3cd86598c87301f23e9ed7b99f16a3a5d1437e84f0787eb65d5f9e35a03c
                                        • Instruction Fuzzy Hash: E931F6753246118BAB266A35A85D7FE76D7BFC8741B180018E94BC3380DF78CD818B59
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d85966a1f4c1bda0ff8495a89e4b8f060fc1f7d99b0cd368dd172bce07ecdd0e
                                        • Instruction ID: 7d03b3286d1f260658ebd27f1ed24e08281415d9aacc4df9b32f0a258d1a1a61
                                        • Opcode Fuzzy Hash: d85966a1f4c1bda0ff8495a89e4b8f060fc1f7d99b0cd368dd172bce07ecdd0e
                                        • Instruction Fuzzy Hash: F141BE78A10209EFDB14EF68D498DAD7BB2FF48360B114498F9069B362DB71E881CF50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9015da5e0c1740aab3bb37e8643081c783aa6e317463d98ea036f35241d3736e
                                        • Instruction ID: 5f02de04a9650e3970992d9a754224c4d7366de4212a0e3c63caae77b0dc8b4b
                                        • Opcode Fuzzy Hash: 9015da5e0c1740aab3bb37e8643081c783aa6e317463d98ea036f35241d3736e
                                        • Instruction Fuzzy Hash: 144136B0A04218DFDF159FA5D944AADFFB2FF44300F228258E545BB255CB3199A2DF41
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e80a4151413fdd2dfa5304d5c8743ba443eb0c5e2dfa93fe64c2938ebd1990ca
                                        • Instruction ID: 3445af857b21956cda48ad219d71f844017becf833c79b6100b87cc2ca65228d
                                        • Opcode Fuzzy Hash: e80a4151413fdd2dfa5304d5c8743ba443eb0c5e2dfa93fe64c2938ebd1990ca
                                        • Instruction Fuzzy Hash: 7331277A324A118F9B266F24B95D7FD76A7BFC86427180019E54BC3380DF78CA418759
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7fa7c561b144442acd71cb19e4cda6cf6d2009bd16c7781155afe3618fc602a2
                                        • Instruction ID: ecc814440b9656d83a3c368faa77a013da9ac952c4af2a8e396dd65a8e0568ef
                                        • Opcode Fuzzy Hash: 7fa7c561b144442acd71cb19e4cda6cf6d2009bd16c7781155afe3618fc602a2
                                        • Instruction Fuzzy Hash: F031C57171C3808FC7069778986D3693FE1AF86215F1985ABE546CB2D3CE788C05CB55
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41fb51275600d071b7fb80e0da1861ec6c6e89846337e3a1a94b2a8f155b21c6
                                        • Instruction ID: 0e821f2b6d1f2ebd8b55cd921eef102c4902813cbaad3e2778fd680fd4cf754b
                                        • Opcode Fuzzy Hash: 41fb51275600d071b7fb80e0da1861ec6c6e89846337e3a1a94b2a8f155b21c6
                                        • Instruction Fuzzy Hash: 8F3127B67006018FEB24CB29CD806BEBBE6EF84314B29826ED086D3751D634ED85C761
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8cf23ad757e84a51c6a06f921767f22582a91006ae7efdf15b8a64bd2efbb88d
                                        • Instruction ID: ad6067262119970eb0cf3077b85f9e1f8c21e8a9703d703de30a6542e4ac05b0
                                        • Opcode Fuzzy Hash: 8cf23ad757e84a51c6a06f921767f22582a91006ae7efdf15b8a64bd2efbb88d
                                        • Instruction Fuzzy Hash: 6B41E2B1D11709CFEB24CFA9C5846DEBBB5BF08304F24842AD408BB211D7B56A86CF90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 727fc86bd8278ac70ab3b3dd4e41685d847ade27941d546048909b225dc2e886
                                        • Instruction ID: 7f037cd48b392741ac42e07f9214841f37c42d19682078fc0b3efb5bd5f3502d
                                        • Opcode Fuzzy Hash: 727fc86bd8278ac70ab3b3dd4e41685d847ade27941d546048909b225dc2e886
                                        • Instruction Fuzzy Hash: B741E2B1D10709CBDB24CFA9C584ACEBBB5BF48744F648429D408BB211D7B56A45CF90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c6c9efa3b679961b0f3044a609b28977dbecfddb91d085f939ae95726df6e64
                                        • Instruction ID: 17397c35d6b8b34a6634698d6a3a6641c18f21f5fa152b292eebc4952ba5c028
                                        • Opcode Fuzzy Hash: 3c6c9efa3b679961b0f3044a609b28977dbecfddb91d085f939ae95726df6e64
                                        • Instruction Fuzzy Hash: F5314DB5900209AFCB10DFA9D844ADEBFF5EB49310F10846EE909E7310D775A950CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 49d6028d6efe3eb15a7ea386a47e91faab6ee84346b91b42294a05643d585903
                                        • Instruction ID: 658ac7fcd05716c8da1f969f32e6b606a15b190df9e0facb78c34e7447bde875
                                        • Opcode Fuzzy Hash: 49d6028d6efe3eb15a7ea386a47e91faab6ee84346b91b42294a05643d585903
                                        • Instruction Fuzzy Hash: 8A31E975620705DBE734CF38D486BA6B7F2FF45350F144A2AD06AC7641DBB0E9048B90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a7c8fa28403ce822ff46a83bd030166f265a765f580d7d13f53689f787625be
                                        • Instruction ID: 3cc0d95cf89e7f5b042f7b8431fb455ccc83a0a8e703da5c78086c38d43a3c1d
                                        • Opcode Fuzzy Hash: 9a7c8fa28403ce822ff46a83bd030166f265a765f580d7d13f53689f787625be
                                        • Instruction Fuzzy Hash: 72412831C10B4B8ACF11EFA9C8501D9F7B4FF95300B11CA19D9A97B211EB71B699CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d7152f0f1f2c419b9d7e4209edc3c831c506fe54184e2ca41dd7183a092fb54e
                                        • Instruction ID: bd17ac0f8712a19a3fda14c7e2bab97cab3d361c670ce69294c45816d9bb6957
                                        • Opcode Fuzzy Hash: d7152f0f1f2c419b9d7e4209edc3c831c506fe54184e2ca41dd7183a092fb54e
                                        • Instruction Fuzzy Hash: 254135B590521ACFCB60CF68D884BACB7B6FB0A300F509699D41AA7345C730AE81CF01
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ca25895556545eb259d3110242ecf8dd98698067623730d676495a6b77a7ec6
                                        • Instruction ID: 4e1597ecc03eba2804569753a7702c5cb0ccac4dd68ef572bb0586447cb4e20f
                                        • Opcode Fuzzy Hash: 6ca25895556545eb259d3110242ecf8dd98698067623730d676495a6b77a7ec6
                                        • Instruction Fuzzy Hash: 98316B74A242568FDB10DFA8C958AEEBBB5BF44380F1084A9D409DB365EBB0D944CB50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8844f36c3bc11e2065a42046db5a2de0c82fda953caecca476acb56f4f59d4d2
                                        • Instruction ID: 964bde7143fa1d3fd1a5dded344d9c140d2a5431590eaa65c5a38dac2c9da495
                                        • Opcode Fuzzy Hash: 8844f36c3bc11e2065a42046db5a2de0c82fda953caecca476acb56f4f59d4d2
                                        • Instruction Fuzzy Hash: B721AC70724204CFCB489BBD985D22E3AE6ABC9211F14863AF916CB3C5DE75CC018B59
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 865e511f0140ece0dce9c715f04848eae1f6417d5c2a954455b280aab9a98f38
                                        • Instruction ID: 34571472153640509cb537fe65c46d2a45f0496a2c31c78524601ff8d5dbc511
                                        • Opcode Fuzzy Hash: 865e511f0140ece0dce9c715f04848eae1f6417d5c2a954455b280aab9a98f38
                                        • Instruction Fuzzy Hash: 7E216271B102455BDF16DBAAC9489FFBFFAEFC4340F14812AE454D3250EAB09A05C790
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2db37dbd7abcfe8ff1584ac428947d6536717b9a2f6528840af8a62d9040ce42
                                        • Instruction ID: 6c49d0ee335c08090be207c92dfcfb13edc3322b3b4aedd018048ecc5ccea915
                                        • Opcode Fuzzy Hash: 2db37dbd7abcfe8ff1584ac428947d6536717b9a2f6528840af8a62d9040ce42
                                        • Instruction Fuzzy Hash: 5521F7F1E2460ACBCB11EB64C4942EEBBB4FF41200F60477EC456A7288EB31D9568B91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7ea24c255b02986fc816db03ccbed6ed8bf145902d792d7dd00b574e91c8f1a5
                                        • Instruction ID: 51055150379c2b3b13dd271ece680145503220ed7577a35ae217cdc52be9ae2a
                                        • Opcode Fuzzy Hash: 7ea24c255b02986fc816db03ccbed6ed8bf145902d792d7dd00b574e91c8f1a5
                                        • Instruction Fuzzy Hash: 763105B1D01269CBDB68CFAAC8447DDBBF6BF89300F00C2AAD409A7214DB745981CF51
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cf7ffe55d299782bdde54fa34810442139caee7adc412ecb914563f005a212ac
                                        • Instruction ID: dabf913fc67f5b528bcb4e70bcc876e2b6ae5e66b3eedc79f65b6bf35665e03b
                                        • Opcode Fuzzy Hash: cf7ffe55d299782bdde54fa34810442139caee7adc412ecb914563f005a212ac
                                        • Instruction Fuzzy Hash: EC31E2B5E0821ACFCB54CF54C984AECB7B6BB4E310F509699D42AA7345C774AE82CF11
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e7d3253f4134243110d2b0cb1fe656e48592abf67757d7569cdb8b0e9d75323
                                        • Instruction ID: ee490dfb68ee7b294c3bcd3d1b03263fbf9bf80aa2ad2519a9a3935d918bafc8
                                        • Opcode Fuzzy Hash: 2e7d3253f4134243110d2b0cb1fe656e48592abf67757d7569cdb8b0e9d75323
                                        • Instruction Fuzzy Hash: 302101767006158FEB24CB29C88167EB7E6EBC8318F28826DD147D3794CA34ED80C761
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 93161c2cb7936d9e93b6471333b6bdde6cb2e2aabd2855b3f928f91a21c9c5aa
                                        • Instruction ID: 4f6d7df35bd65b9ce03305a56f29b93f7a892163f46fe0dc6d42c6e72add5b0c
                                        • Opcode Fuzzy Hash: 93161c2cb7936d9e93b6471333b6bdde6cb2e2aabd2855b3f928f91a21c9c5aa
                                        • Instruction Fuzzy Hash: 3721F175A102058FCB00DFB8D4485AFBBF6EF84304B1489ADD10AEB351EF75E80A8B90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 612e8d4db5b925907f93b7fddbae86a19f8f99b0ba35bbfc96680855c434f0ef
                                        • Instruction ID: 2bb15989e1afa5db2dcf34556576de5d7bf2b531089ab910996e89a6a6b31882
                                        • Opcode Fuzzy Hash: 612e8d4db5b925907f93b7fddbae86a19f8f99b0ba35bbfc96680855c434f0ef
                                        • Instruction Fuzzy Hash: CE21A874620B06DBE735DE38D486B66B7F6FF45350F040E29E0AACB640DBB0E8458B91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7619ef3a9cb09a32a47c7421dc53f5be681a95ef388efcd8a0b58a939b2d2a5b
                                        • Instruction ID: a3a1f8e0cb82c76e7e3f6a3d6a1856e73f6af7a2ad6692777b51330fbf029d47
                                        • Opcode Fuzzy Hash: 7619ef3a9cb09a32a47c7421dc53f5be681a95ef388efcd8a0b58a939b2d2a5b
                                        • Instruction Fuzzy Hash: A7219D71E106098FCB51EBA8D4486EDB7F4EF89310F00826AE919E3364EB719991CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cbc72a3ca86fdf7ec17d915e45955e332eedfdd096e0a006ceeaa1f2fd7d8450
                                        • Instruction ID: ade073d1965b72eab28997fafcc77c57893fdc1bac14545ef1c4698a77105e8c
                                        • Opcode Fuzzy Hash: cbc72a3ca86fdf7ec17d915e45955e332eedfdd096e0a006ceeaa1f2fd7d8450
                                        • Instruction Fuzzy Hash: 5E215E35620210CFDB18EF28C498AA977F6FF88741F1544A9E406DB362DBB59C41CF90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773550687.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_122d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 602aa527db40bd42bd1c22f547eeb6e1e6fd3ca5ed86e1521872c3190025f0fe
                                        • Instruction ID: 6813b2e436ac40fad11268cef1dc873f1de0325d03d4d3f255ec9b6226c9532a
                                        • Opcode Fuzzy Hash: 602aa527db40bd42bd1c22f547eeb6e1e6fd3ca5ed86e1521872c3190025f0fe
                                        • Instruction Fuzzy Hash: 62216771510248EFDB01DF58E9C0B2BBFA5FB88318F20C569E9090B256C3B6D466CBA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 296881e932e361ba289a1c68e3aa4f7364c8a5c178d3c983ae5a662a2b3ad28b
                                        • Instruction ID: b3f10bccf9db33fc84c504487138b93de96098b3dfad5f0ef9d4c87915ae5a59
                                        • Opcode Fuzzy Hash: 296881e932e361ba289a1c68e3aa4f7364c8a5c178d3c983ae5a662a2b3ad28b
                                        • Instruction Fuzzy Hash: F8218E74B102058FCB54DF69C8848EEBBB5FF89300705866DE905E7355EB30E945CBA0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3b06faa4e8ab95ce763c9180ea89d7302c41634ca0b380892488dde0dcdd188
                                        • Instruction ID: e2a4f25387d526e704091e19eb75bd8345d3a772c607662c23cca430dd1f0ac2
                                        • Opcode Fuzzy Hash: f3b06faa4e8ab95ce763c9180ea89d7302c41634ca0b380892488dde0dcdd188
                                        • Instruction Fuzzy Hash: 0E216A34321601CFDB18DB39C894A6977AABF85754B1084AEE506CB371EBB2DC06CB50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 49675f682f06c0cf9f6b99af9e8350e8e836028a08724fb4bcfd66e4aaa119b6
                                        • Instruction ID: d338709cfd3f5198119ef6eeb81457d464b0293cd32d86e19fa0039345a9f14e
                                        • Opcode Fuzzy Hash: 49675f682f06c0cf9f6b99af9e8350e8e836028a08724fb4bcfd66e4aaa119b6
                                        • Instruction Fuzzy Hash: B0215E34321601CFD718DB28C894A6A73EABF85754B10846DE50ACF370EBB2DC45CB50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0366b0afb799f778d0a2637c73f18d9ff20ccec20385c420cba7c78a8bdaa27a
                                        • Instruction ID: 1a17174563d1e2d4657320ce0c10a71dc2c31112af208a55b81514d1f656181a
                                        • Opcode Fuzzy Hash: 0366b0afb799f778d0a2637c73f18d9ff20ccec20385c420cba7c78a8bdaa27a
                                        • Instruction Fuzzy Hash: 5921BE397102049FDB20AF09D5C4EBA73ABFF89760B00442EE60A87752CBB1F840DB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773635954.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_123d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 53c88d172e4f4a7076bca24c56faae3714ea6fc541d03aa95044fcbc7033dffc
                                        • Instruction ID: 10f125cb19e1c251332efef21ddfc40f602346ddcc8a3c66703b17645266aa94
                                        • Opcode Fuzzy Hash: 53c88d172e4f4a7076bca24c56faae3714ea6fc541d03aa95044fcbc7033dffc
                                        • Instruction Fuzzy Hash: 612146B1524208EFDB01DFA8C9C0B26BBA5FBC4324F60C66DE9494B257C376D846CA61
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773635954.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_123d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 216dfffbf7526093dae9621109388fc620d34c7da23b06b19bd607ff63fbcb69
                                        • Instruction ID: 31b3405fee75e47dac7146ee99faa3b008d9c183791c42f20b074ec67e3a4695
                                        • Opcode Fuzzy Hash: 216dfffbf7526093dae9621109388fc620d34c7da23b06b19bd607ff63fbcb69
                                        • Instruction Fuzzy Hash: 9B2130B0614208DFCB11DF68D980B26FBA5EB84B14F60C569E90A4B256C37AD406CA61
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ea4430d4070f257360a6c656927e3c6defdc096efbebc66f4a4cbabe8d471815
                                        • Instruction ID: 94f043bcae3d23e965780b2210726c15cd1a9f833d38193521fbc78ed0b93043
                                        • Opcode Fuzzy Hash: ea4430d4070f257360a6c656927e3c6defdc096efbebc66f4a4cbabe8d471815
                                        • Instruction Fuzzy Hash: 5631AFB0C112189BEB20DF99C589BDEBFF5BF48354F248059E408B7250C7B55985CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 63800b3824e7a80c822845e045e99e77f7a5779115585ebc9b53e6b9475d76f3
                                        • Instruction ID: 2c75e57068b70e33524523a1f49b9b23a71b21045fe80b638eaac0dbfa60b4bd
                                        • Opcode Fuzzy Hash: 63800b3824e7a80c822845e045e99e77f7a5779115585ebc9b53e6b9475d76f3
                                        • Instruction Fuzzy Hash: 2E213075B1020A8FCF54EF69C8848EEF7B5FF88300B10866DE905A7345EB70A945CBA0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a9d06e8df2105ac39d8864d1cc4234df3c9102e026c06773a8d099a376e5d9b
                                        • Instruction ID: 4714baa92584aa3097ff3d84845c2c27ec4adfa0f4d5ad439e6fd977f0fc3e2a
                                        • Opcode Fuzzy Hash: 9a9d06e8df2105ac39d8864d1cc4234df3c9102e026c06773a8d099a376e5d9b
                                        • Instruction Fuzzy Hash: 6911E772914695DFC702EB3CDC648DABFB0EF82210B0402ABC1818B276D7709949CBE6
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 709a00fa6e676e8539799f10b97301b1b6bea9152af08412dc84b03815ca2e87
                                        • Instruction ID: 17c06ab6a17e90061e7b43bf086f19554d38e470418cd83ddd3a3314f0429f77
                                        • Opcode Fuzzy Hash: 709a00fa6e676e8539799f10b97301b1b6bea9152af08412dc84b03815ca2e87
                                        • Instruction Fuzzy Hash: 2D215E75A1020A8FDF05DBB989806FFB7F6FF88340F14452AD409E7255EB749A05CBA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a2ea9bcfdad3835689371ec0db628ba73433523c921948912f9747108570df2
                                        • Instruction ID: 65e72ee43f0694309c516a9b4008a0821a7b1894c535f5e4974d58b0d8d04b5d
                                        • Opcode Fuzzy Hash: 1a2ea9bcfdad3835689371ec0db628ba73433523c921948912f9747108570df2
                                        • Instruction Fuzzy Hash: EE216AB0340701CBC369EB79865052AB3FAAFC9254B584A6DD8528B3A5EF35D802CB21
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e8e47e38329c57bd69dde20fe6e8e8287cd0be96378fbd255a484af275eb4ae
                                        • Instruction ID: e6c4c6de6895d09a94e0d7899a2cb84e38b6243e0c13962f015838d68ee8ab47
                                        • Opcode Fuzzy Hash: 1e8e47e38329c57bd69dde20fe6e8e8287cd0be96378fbd255a484af275eb4ae
                                        • Instruction Fuzzy Hash: 8D2181F1A24259CBC714CBAD858327EBBA0BF46301F14462FE625C6281D2349958D7A6
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd93099b1fec0b1534c826b47ecebae872244ac6d68f1d8e62687234c32135a5
                                        • Instruction ID: 744db00ad85dc15d6bfeb4498fa809a2f530d3d17041c224b9f9e5b6514e6f12
                                        • Opcode Fuzzy Hash: fd93099b1fec0b1534c826b47ecebae872244ac6d68f1d8e62687234c32135a5
                                        • Instruction Fuzzy Hash: 1331CEB0D112189BEB20DF9AC588BDEBFF5BF48354F248059E408BB250C7B59985CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9aa222404cfaac1de199c1ab575c01b6e9c19614c2941f95762f6d744ff9c62
                                        • Instruction ID: a2cbd16dc103ce713a01493ca6f96d0962c6ea8ad2cd9cd8a8ce261b0a04ba04
                                        • Opcode Fuzzy Hash: c9aa222404cfaac1de199c1ab575c01b6e9c19614c2941f95762f6d744ff9c62
                                        • Instruction Fuzzy Hash: 7F31F77591070A8FCB01EF68C5805D9F7B0FF59300B00CA6AECA9AB211EB70E694CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f874bbe56c370aa6b9a30e767938046eb16e6ecd01ac87821cba42f85cec1ad9
                                        • Instruction ID: 2e4f63a1404e8f85e5fe8d3fa72e6c077a1ad0e8a18acc6c69d4252ef993df2f
                                        • Opcode Fuzzy Hash: f874bbe56c370aa6b9a30e767938046eb16e6ecd01ac87821cba42f85cec1ad9
                                        • Instruction Fuzzy Hash: 452159B1D056998BDB18CFAAC8043DEFFF7AF89300F04C1AAD409AA254DB700986CF51
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3456f03e03dd65e73d5d4636da9c9c2f6f5b9c5fe4ef61ce09e796cd33a4c5c9
                                        • Instruction ID: a4a09069e7f48ab42497b497e9d67076640628500818e31dae596acd9727f113
                                        • Opcode Fuzzy Hash: 3456f03e03dd65e73d5d4636da9c9c2f6f5b9c5fe4ef61ce09e796cd33a4c5c9
                                        • Instruction Fuzzy Hash: 8821AC797006019FDF20AF15C4C0EAA77B7BF89760B11412DEA5A87762CB71F840DB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8fa472917dafbc1222352dce53d1eb0dbcbf3b60d7def5d0f862e3deeb7b0abc
                                        • Instruction ID: ac32192c02cef6adad69cb9e3f99c348818775bd9b071c5cc43654fd27f3cf0b
                                        • Opcode Fuzzy Hash: 8fa472917dafbc1222352dce53d1eb0dbcbf3b60d7def5d0f862e3deeb7b0abc
                                        • Instruction Fuzzy Hash: 20113DB4D09208DFCB44CFA5D4409ADBBF5FF8A310F1496AAD81897316D7319A41CF41
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 181fbcb75ae26288c56d34f77a24a9b825b1b1747af6ee43d81c55f741c190cb
                                        • Instruction ID: b0750de3289d89cc848c675247fb1cbbc0493be96e468d0c1bfda6be4c5a0318
                                        • Opcode Fuzzy Hash: 181fbcb75ae26288c56d34f77a24a9b825b1b1747af6ee43d81c55f741c190cb
                                        • Instruction Fuzzy Hash: BA21F2B19013499FDB10DF9AD884AAEFBF4FB48310F10842EE919A7301D374A944CBA4
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98cdc1de4f34aafc835a589d9200e657632bebc9353d74d11314d4482b6df7bf
                                        • Instruction ID: 5fcecb2061a7a954c3b84e7b24a4b8a7b8f03eec1c0561cf9bc12b49397f982a
                                        • Opcode Fuzzy Hash: 98cdc1de4f34aafc835a589d9200e657632bebc9353d74d11314d4482b6df7bf
                                        • Instruction Fuzzy Hash: E0112BB07552049FD7198726880AB2E3BD7EBC5B00F1585AEE0428F3D6D9B58C418791
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cef0754b2cd8793a45d5eae5db678c10941ae5e488811f54e9922e37871aeec0
                                        • Instruction ID: cace84f99da4175dbdb5b4bce31b2ab27a19d01d3c14a1dcd029f8ae2ff2b233
                                        • Opcode Fuzzy Hash: cef0754b2cd8793a45d5eae5db678c10941ae5e488811f54e9922e37871aeec0
                                        • Instruction Fuzzy Hash: BC119DF1E24116CBC754CFA996832BEF7B0BF85302F14462FE26586181D3349958C7A1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9efbb9f8b4b09299cc84f431b3f92b30510f83b8064afc7fb9da742ed768f1ef
                                        • Instruction ID: 1afdedacba8abb1415063c03cb2ba0596abf54e9c7a0465ebc812ba691a390de
                                        • Opcode Fuzzy Hash: 9efbb9f8b4b09299cc84f431b3f92b30510f83b8064afc7fb9da742ed768f1ef
                                        • Instruction Fuzzy Hash: 3F11C1F2F00106EBCB52AF94D9541EEBFB0FB85300F600DA9C09AB3584E6308630CB95
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72dd5051cea0c22228c03d61f4d3fedb3a895c91dd62c53ace5f13882a896689
                                        • Instruction ID: 0b9de47b58589292e6a7444ee4a85078d276d7d415ed037fc59032b73b37443d
                                        • Opcode Fuzzy Hash: 72dd5051cea0c22228c03d61f4d3fedb3a895c91dd62c53ace5f13882a896689
                                        • Instruction Fuzzy Hash: A511E7B1906344EFCB06CB65D8500EE7FF7AF87310F0595AAD4409B2A1CB30094ADB52
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 692dcce37593a962e39ca16592d796a0eca0815218c5f15de9d662cd3c05078a
                                        • Instruction ID: d41389a4cb66253f87d506e9714f37a59a065c761ae7c0460072d1a60e4be0d3
                                        • Opcode Fuzzy Hash: 692dcce37593a962e39ca16592d796a0eca0815218c5f15de9d662cd3c05078a
                                        • Instruction Fuzzy Hash: ED1174F1B452008FD726CB249807B6E3BD6EB82710F0946FEE0068F2D6D5B288418782
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db1e66c01d2babb11f7d48fd5f4cd0e03922aaed2d03f73ddd732f13eb974d16
                                        • Instruction ID: 491b9f81c5322ad542700e9da1cf8af062291f6b7206d66bcc98571a25341231
                                        • Opcode Fuzzy Hash: db1e66c01d2babb11f7d48fd5f4cd0e03922aaed2d03f73ddd732f13eb974d16
                                        • Instruction Fuzzy Hash: B121DB7591070A9BCB00EF68C5805DAF7F4FF59310B10CA6AEC99AB211EB70E694CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b41d6c6ecc877677e71c90855eae524e3a0024bbfe750632f86a27dd59f8d5e0
                                        • Instruction ID: 76d4017649874be0be855b67b58b8991c09d627e5a8c2b5db5e12247bc78a7c5
                                        • Opcode Fuzzy Hash: b41d6c6ecc877677e71c90855eae524e3a0024bbfe750632f86a27dd59f8d5e0
                                        • Instruction Fuzzy Hash: 9D21FFB190134A9FDB10CF9AD884A9EFBF8FB48310F14842EE919A7301D374A944CBA4
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de356c9243b768cf874060c6c32fe4b1335cf7da1cf2867c64db64addba07c02
                                        • Instruction ID: d50fc8d814ec36514f9c02c4ede3679b3cbb47a0e5468963d4e4b2487783d734
                                        • Opcode Fuzzy Hash: de356c9243b768cf874060c6c32fe4b1335cf7da1cf2867c64db64addba07c02
                                        • Instruction Fuzzy Hash: 8A21B7B8E09209DFCB44CFA9C5819AEBBF5FF4A300F209199D419A7751D730AA41CF61
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9576e91405f0414954a9c7bc68eed7f9419f3c62893974cee55957027814e73
                                        • Instruction ID: b421d419279f5a513c5a3e9339abad899d996aa60471169438c356b3b71f9a7b
                                        • Opcode Fuzzy Hash: b9576e91405f0414954a9c7bc68eed7f9419f3c62893974cee55957027814e73
                                        • Instruction Fuzzy Hash: 9E2136B5D003499FCB10DF9AD945ADEBFF4FB49320F10841AE958A7210C379A944CFA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773635954.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_123d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 33756d8b4f719ad9cca1da437ab33c0a31313b4922a9b888174b99caff0ac726
                                        • Instruction ID: 6d70480b00180710440c10c0f5cc7c3956ab1b8f4552d11b42500aadf76e8351
                                        • Opcode Fuzzy Hash: 33756d8b4f719ad9cca1da437ab33c0a31313b4922a9b888174b99caff0ac726
                                        • Instruction Fuzzy Hash: 6B2183755083849FCB02CF64D994711BF71EB86714F28C5DAD9498F2A7C33A981ACB62
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d5023110d529fcf63cea09deae46fd83ef387bc3989159319056a126affca704
                                        • Instruction ID: 3497b36789fa8bbb8e3ac829457195e92cd37d8fe96eef531a624b1a3700cf4b
                                        • Opcode Fuzzy Hash: d5023110d529fcf63cea09deae46fd83ef387bc3989159319056a126affca704
                                        • Instruction Fuzzy Hash: 6511C4B2A202065F9B15EB7A88584FFBBFBFFC43A07144929E429D3340EF7089058350
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aa402ce04ecb11211bc062d03329f61e0a8e1c952bf1ba52184d96b4ea1bb8c2
                                        • Instruction ID: a038fb3dd8536e4cd0359e3762cf3a05cfefed1476da2b2ce773c88e021d1fd5
                                        • Opcode Fuzzy Hash: aa402ce04ecb11211bc062d03329f61e0a8e1c952bf1ba52184d96b4ea1bb8c2
                                        • Instruction Fuzzy Hash: 0021EDB5E0025A8FCB45CFADC9449AEBBF1FF89310B14816AE918E7315E774D901CBA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f62bbfc89152639207df26e8d76aca3320afb66894be05b61b1dcfbfb3e3c373
                                        • Instruction ID: bc4fc212fa4a348be9bd5118b9b8dd71337cbc8202573cf6d511a41d4992b01e
                                        • Opcode Fuzzy Hash: f62bbfc89152639207df26e8d76aca3320afb66894be05b61b1dcfbfb3e3c373
                                        • Instruction Fuzzy Hash: DB1103B4B102049FCB15DB68D5549ADFFF5EF89314F1481AED401EB352CB319805CB92
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f35a3697d79b9e379da021039381afb6bf93b8d6b74a118d07db7568ee7c1b2
                                        • Instruction ID: 61440ecf70b3fd49b339ea4eddc825c958fc9820b6f5df3aab2053dedc02acb7
                                        • Opcode Fuzzy Hash: 3f35a3697d79b9e379da021039381afb6bf93b8d6b74a118d07db7568ee7c1b2
                                        • Instruction Fuzzy Hash: 3C1158B0D49208DFCB04DFA9D0809EDBBF6AF4A310F08969AD4189721AD330AA058B81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6bc7000bba110742d1512078ef3766350fb2e26e1749d51ce9e6423f8e9da154
                                        • Instruction ID: 94d54a06bf2ec334e2acc8a6300a511a4348125b1e4eea63cc07ac2bbc0395c1
                                        • Opcode Fuzzy Hash: 6bc7000bba110742d1512078ef3766350fb2e26e1749d51ce9e6423f8e9da154
                                        • Instruction Fuzzy Hash: 15118175A102058FCB10DB78C5489AFBBF6EF84304B0089A9D546EB350EF74ED098F91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d301d506d9e35c65dd012ae8a138cb1b009efb8e66a445692be4a2484902902e
                                        • Instruction ID: bb0488fbf9f37dda257f4ee310e2b5eaaa835ee6f1ebe35a179d0d4236139a47
                                        • Opcode Fuzzy Hash: d301d506d9e35c65dd012ae8a138cb1b009efb8e66a445692be4a2484902902e
                                        • Instruction Fuzzy Hash: 5D216A31910B468BDB10AF6AD840281F370FF99320B25C779DDAD7B691EB70B990CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad347d59c4a7f30b685ed2f286cdceaf688d4032cc7201bbc0f34455c74ea828
                                        • Instruction ID: b36f540b0fa8ba99514f493c42cb36622861d6c7cd94ae0563b24e4f706c97b8
                                        • Opcode Fuzzy Hash: ad347d59c4a7f30b685ed2f286cdceaf688d4032cc7201bbc0f34455c74ea828
                                        • Instruction Fuzzy Hash: 0911A0B6A202165B9B15EB7998449FFBBFBFFC83A07144929E419D3340EF7089058760
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8c7fa1a357faa360e7b42a24686eaa8f03b79b64f26c7b9e078dbcecff931bc
                                        • Instruction ID: c53ecfa1c7ed00591f14484220316ea07a97a6b3906e3fab377b65987244eefe
                                        • Opcode Fuzzy Hash: f8c7fa1a357faa360e7b42a24686eaa8f03b79b64f26c7b9e078dbcecff931bc
                                        • Instruction Fuzzy Hash: D7113175A12384DFCB01EBA5C6406EDFBA1EB89214F2086ADD104E7A41CA319C09CB93
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4eab083ead64bb741f4f95f18a09605b5cb4aab4778657551968be6473eda76b
                                        • Instruction ID: 7db3c220e06b91c16aa2c8f0dafd5b06789246f859c0bd528b675ea7c2938b0d
                                        • Opcode Fuzzy Hash: 4eab083ead64bb741f4f95f18a09605b5cb4aab4778657551968be6473eda76b
                                        • Instruction Fuzzy Hash: 9621B7B8E05209DFCB84CFA9C1819AEBBF5BF49300F209199D819A7711D730AA41CF91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0cf1511da6c874d7bc8b85da7446d9036600bfd7f91a5f14ea766d49d7176450
                                        • Instruction ID: 237e63f5de86c4c0b6504b797ca752f2806e9a75e9e144660083e306647dd6e8
                                        • Opcode Fuzzy Hash: 0cf1511da6c874d7bc8b85da7446d9036600bfd7f91a5f14ea766d49d7176450
                                        • Instruction Fuzzy Hash: D7014C3AB345010BD72496288C807FF638BEFC93D4B1D456AC10EEB249DCB0A4055290
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 79abdef7932c92884cd9f6e6ce2cdd91061073c072fccfa005edbd4cda432364
                                        • Instruction ID: 901f3af9d40a5b21a05da0f9e80507c1265e6a3b1439818d92ce245091fad04e
                                        • Opcode Fuzzy Hash: 79abdef7932c92884cd9f6e6ce2cdd91061073c072fccfa005edbd4cda432364
                                        • Instruction Fuzzy Hash: 0E212731910B068BCB10AF6AC840291B371FF99320B25C779D9AD7B295EB71B890CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773550687.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_122d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction ID: 2dffcb8456451eb7563be566ed7edf7f19b92a88313666a761402dcf0fd76cec
                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                        • Instruction Fuzzy Hash: D4110376404284DFDB12CF54D5C4B1ABF71FB84318F24C6A9D9090B257C33AD46ACBA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca111f937f33732cb08c2b18465aee40658878c76214e250e60a8358db4a623d
                                        • Instruction ID: d8b67323e5a0a1d5c365913cd83574ba59d9f8861a267f44b5b4f9a388a9cff7
                                        • Opcode Fuzzy Hash: ca111f937f33732cb08c2b18465aee40658878c76214e250e60a8358db4a623d
                                        • Instruction Fuzzy Hash: 772112B59003499FCB10CF9AC984ADEBFF4FB49320F10842AE919A7310C378A944CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5dd91ad3461a41d45eed720a38bd7ee2f9a86f1851edd75ee23b542ca5191fe5
                                        • Instruction ID: 874003013b1841713872e188b9c0cb2880d3f4c0514569d07ee739dd7d7f6ef1
                                        • Opcode Fuzzy Hash: 5dd91ad3461a41d45eed720a38bd7ee2f9a86f1851edd75ee23b542ca5191fe5
                                        • Instruction Fuzzy Hash: B901D231B142149FC748EB79A85426FBEE6AFC8210F14847EE50DD7384EE35894587D1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d12a7a562a36ff1d044f77418e1f0e6d91339935f57519ce02c8b221441b2b36
                                        • Instruction ID: 2447a0d67e4dbef380e4a7d8a5e7348e3533ca35ba6c7fa91ecc8964777b3556
                                        • Opcode Fuzzy Hash: d12a7a562a36ff1d044f77418e1f0e6d91339935f57519ce02c8b221441b2b36
                                        • Instruction Fuzzy Hash: 9101F73AB7490147EB24C62888C07FFA28BEFC8394F5C8579D20FEB248DDB0A8455280
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773635954.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_123d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction ID: 962edb37e842ccee071b13ab85e718fe81240c386213bba24de160c34b93f3f3
                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction Fuzzy Hash: 2C11BBB5504284DFDB02CF54C5C4B15BFA1FB84224F24C6AAD9494B297C33AD40ACB61
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09adb09dba57da72f320adbe7349453ed3050bf13156a667f248234885c2234e
                                        • Instruction ID: 6b459367571406dccd9202e0498a826e3e76b05651107f7d94999a3cf11153fc
                                        • Opcode Fuzzy Hash: 09adb09dba57da72f320adbe7349453ed3050bf13156a667f248234885c2234e
                                        • Instruction Fuzzy Hash: F81189B5E0011A9F8B44DFADC9449AEBBF5FF88310B10816AE919E7315E7319911CBA0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 651f64d2eaae614f6e202e878f8007f049c8b140644eb58b6ebe78176f7dd2f9
                                        • Instruction ID: 714399f9d78702589e15c35bf597466f5c610a83318e4f65c6253fbc9c243b28
                                        • Opcode Fuzzy Hash: 651f64d2eaae614f6e202e878f8007f049c8b140644eb58b6ebe78176f7dd2f9
                                        • Instruction Fuzzy Hash: 8411F3B5D142099FDB10DF9AD448ADEFBF4EF48320F14841AE859A7350D3B4A544CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 75fc5fe5b6c202bdb3c145f84e532ea9926a38fbf69642257920b4a4694a68c3
                                        • Instruction ID: f53355ac0962078e94ebf43f59f94dba93fff271895e1272c50628af492a0d95
                                        • Opcode Fuzzy Hash: 75fc5fe5b6c202bdb3c145f84e532ea9926a38fbf69642257920b4a4694a68c3
                                        • Instruction Fuzzy Hash: DC115A71A1020A8FD725DFA8C680A9EBBF5FF49340F240069D408AB320DBB2E941CF90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e14a5ca36b72ceeacf9e6187ce492d70c5737e0e9203fd59223ffe499bc5ef5e
                                        • Instruction ID: e8228a64d82d348a1b809f21cd29ae962d069934cbd035550d0d83597947e5e3
                                        • Opcode Fuzzy Hash: e14a5ca36b72ceeacf9e6187ce492d70c5737e0e9203fd59223ffe499bc5ef5e
                                        • Instruction Fuzzy Hash: DA11F6B5D142499FDB10DF9AD449ADEFBF4EF48320F14841AD858A7350D374A544CFA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48ae9185a08d2f8c98805545196f87b6b06d1d872d9eb68607a5f989bd672e55
                                        • Instruction ID: 73792200278f4e33ed403c68e4892686998f3f89693b76cb32ffc1cbd74af9a9
                                        • Opcode Fuzzy Hash: 48ae9185a08d2f8c98805545196f87b6b06d1d872d9eb68607a5f989bd672e55
                                        • Instruction Fuzzy Hash: 15018F397145118FDB15AB78D588BB937DAAFC9754F2940AAD20ECF360DEA1CC06C7A0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b479ad1d7eba52551fd7337727e4f1551898920d35a54c415c8149674006b388
                                        • Instruction ID: 3738241ab450713e2b3a1706e34c6356615085610ebe6a3f3b109cda79f3a682
                                        • Opcode Fuzzy Hash: b479ad1d7eba52551fd7337727e4f1551898920d35a54c415c8149674006b388
                                        • Instruction Fuzzy Hash: AB01F7F2F04206AF8752EF54D9251AE3AF0BB49300B150AAA845AE3680F630841486C5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a5316c4cf671d16a4daeb1665af8ed804cc5a9389121bf556105313494cbbcc7
                                        • Instruction ID: 2f2b0e7d2ae72574a56be4938bf191d6f4f25b5d299d1504ccd00be863157b4a
                                        • Opcode Fuzzy Hash: a5316c4cf671d16a4daeb1665af8ed804cc5a9389121bf556105313494cbbcc7
                                        • Instruction Fuzzy Hash: 58116DB4A16115CFE710CB24DA86A9DBBB5EB45305F19A2A9D10CD7212D330EDC5CE85
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59b844d2876afbd3d8e751a40302995e7a070db47374f01571c1dbf6d2f2a075
                                        • Instruction ID: 233241b75306aad0fd11aa8eb4444b63ad3c603ad2b2bdda651165b897930e53
                                        • Opcode Fuzzy Hash: 59b844d2876afbd3d8e751a40302995e7a070db47374f01571c1dbf6d2f2a075
                                        • Instruction Fuzzy Hash: 4201F2B661C1718FC301CB2898402BE77E8FB0A221F19876BF0A5CB1C1C338C9458399
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9021880f5e920c471d7d00be310d5b206800f01f1c7f7f03a9b22e8c38d9632
                                        • Instruction ID: 63a27b61b1614b3e4a0095c4dd5dfc5b6053047525f59eebb374f71a585349c5
                                        • Opcode Fuzzy Hash: c9021880f5e920c471d7d00be310d5b206800f01f1c7f7f03a9b22e8c38d9632
                                        • Instruction Fuzzy Hash: 9501043291074A9FCB01EB68CC448CABB75EF86304B11876AE00167251EA70A599CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 144152c5af2447187bde1fe2fbb3d88fdd6929dd49d45ec38e7ca4a0659795b3
                                        • Instruction ID: cf7d853ebcfa0aa80e72997541f2421abd47f1f9f3ba6387be07ba02cd0b1417
                                        • Opcode Fuzzy Hash: 144152c5af2447187bde1fe2fbb3d88fdd6929dd49d45ec38e7ca4a0659795b3
                                        • Instruction Fuzzy Hash: 141122B5910348DFDB20DF9AC584BDEBBF8EB48320F10841AE919A7710C3B4A944CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e604745a459b576b23c37a3b50d85d82244f5a4da6592758bfb746f4709fc65e
                                        • Instruction ID: 2d5d42c7e1869af12a9f04a58625cd947f9b0aa078e349cd2809c22826f6f211
                                        • Opcode Fuzzy Hash: e604745a459b576b23c37a3b50d85d82244f5a4da6592758bfb746f4709fc65e
                                        • Instruction Fuzzy Hash: B81122B5910348CFDB20DF9AD584BDEBBF4EB48320F10841AD919A7710C3B4A944CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f27668dd45a4297190dadf9f7de718cd9a9a62d2f056d810f908c932a49fc2b2
                                        • Instruction ID: ad0198b63b8e77d7ad04778935a4fe68a40f65a38798f26903ecbc7f19b53120
                                        • Opcode Fuzzy Hash: f27668dd45a4297190dadf9f7de718cd9a9a62d2f056d810f908c932a49fc2b2
                                        • Instruction Fuzzy Hash: 421122B59003489FDB10DFAAD589BDEBFF8EB48320F20841AD958A7310C3B4A544CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d39bd4d68f5cb6149befe742fff4982ed4dd67ede9cca682df91c408d69d09ea
                                        • Instruction ID: 02526223f183a3d55d023252ada990f92b2a19c4f75929154411cd178e3b9981
                                        • Opcode Fuzzy Hash: d39bd4d68f5cb6149befe742fff4982ed4dd67ede9cca682df91c408d69d09ea
                                        • Instruction Fuzzy Hash: 82012131B183049FDB09DBB994285BEBFEADF85250F0884BAE40CD7341EE709C408395
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56a5f8704939ead9c8cd94d13f076c766eef68df6530ef3ea5a997a5abde6e84
                                        • Instruction ID: d3d9a202db5c250afa6e2803a0324dbbf861555d2829c506b6c365d2fbf28950
                                        • Opcode Fuzzy Hash: 56a5f8704939ead9c8cd94d13f076c766eef68df6530ef3ea5a997a5abde6e84
                                        • Instruction Fuzzy Hash: 69F02D317183115BFB1015B964057A665DAAF803F6F54073AE51DC22D0CFE4C8C58697
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773550687.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_122d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d88f780dd97b298e3084909104965cbbcffd1c27103bd83a666c185e90e9c457
                                        • Instruction ID: 58e4553322c3866704ee3e0ce9f54a2c458ac496aa7917ea55f35c7553df5fd8
                                        • Opcode Fuzzy Hash: d88f780dd97b298e3084909104965cbbcffd1c27103bd83a666c185e90e9c457
                                        • Instruction Fuzzy Hash: BE01F731018398AAE7144E69CD84B6BBFD8EF41324F18C52AEE084A286D27D9840CAB1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0870a2a1218aaa0472f10c83eca2162fecff3e43e3f9b6a4ee3b5740fb131f7d
                                        • Instruction ID: 724cad41109b1d4142b7acc122cf8b4f5b71205aa451e698b54bfcc56365099e
                                        • Opcode Fuzzy Hash: 0870a2a1218aaa0472f10c83eca2162fecff3e43e3f9b6a4ee3b5740fb131f7d
                                        • Instruction Fuzzy Hash: 67019E309282599FDB24DBA9C880EEEBBF6BF89340F144469F455EB361C7B098018B54
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7d56ca9e03be27e69d764234bba6fb445512977fc13abd3001b1cc96551d35b0
                                        • Instruction ID: 0a0eb18041dcbe0f369aca06d5a756f77a960f34faa87b983a42282091e80227
                                        • Opcode Fuzzy Hash: 7d56ca9e03be27e69d764234bba6fb445512977fc13abd3001b1cc96551d35b0
                                        • Instruction Fuzzy Hash: 1601AD70D0020A9FDB44EF68C8517AEBBB0FF08304F008229D825F7394DB749941CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 845759d96e62b60bb0ff5ba951ddf633194ec18a9d47958281e605c1f8dc3977
                                        • Instruction ID: 0a514c48d5ab966e952876236ba93d5d9643db2c09e0096b77b51f7a1758870d
                                        • Opcode Fuzzy Hash: 845759d96e62b60bb0ff5ba951ddf633194ec18a9d47958281e605c1f8dc3977
                                        • Instruction Fuzzy Hash: 14018FF4E19209CFEB04CB56D8442ECB7BAAB86210F24E3BE852DD2355D7300A858F45
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7abf9f7696f2a390e82170506a861610a65283544bbcd74c191c7d520f65b5b1
                                        • Instruction ID: 711e153feea5201d8471595f42051cb682d52fb71af71367eac757d6bb9a05f9
                                        • Opcode Fuzzy Hash: 7abf9f7696f2a390e82170506a861610a65283544bbcd74c191c7d520f65b5b1
                                        • Instruction Fuzzy Hash: C801A2B1D193859FDB129B7998006DEBFF0AF47200B0540BAD088E7212E3759618CBA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 955d1e51e48a694424140810f8be0a1ac9e67352a055f54d03db1bcc069b5ca1
                                        • Instruction ID: eab751f4b03585feb8ee2c20c364d9c70f04d222457500e1adec76c0dfa188fc
                                        • Opcode Fuzzy Hash: 955d1e51e48a694424140810f8be0a1ac9e67352a055f54d03db1bcc069b5ca1
                                        • Instruction Fuzzy Hash: 26018CB0E0025A9FDB44EF68C8557AEBBB0FF48304F008629D915F7394DB749941CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 624445f0ff084e03ae8c0e1c9b95a638ce80d2d9fb417deb7046349cb286e164
                                        • Instruction ID: be67e7c0b1704e2064e17b70c00be05538a4c3ccebae8e851d429513e6540e5e
                                        • Opcode Fuzzy Hash: 624445f0ff084e03ae8c0e1c9b95a638ce80d2d9fb417deb7046349cb286e164
                                        • Instruction Fuzzy Hash: C2F0F6B66181358BC310CB6CD84067EB6E8F74A221F15C73FF169C76C1C338D8459299
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ae8bc2d7bf350e76c2ca35b67f0c079ae52ea00386df4f353e497f146cfb0ba
                                        • Instruction ID: cf675bf42eea428e7bd390a7a11f83544c93c33c95cd6219a104e92e8514f384
                                        • Opcode Fuzzy Hash: 9ae8bc2d7bf350e76c2ca35b67f0c079ae52ea00386df4f353e497f146cfb0ba
                                        • Instruction Fuzzy Hash: 0001482245F7E11ED703AB3899B40CA7FB49D4322470A01D7D0D4CE0B7E6699A9DC7AA
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 84514e443a559a34d03d4f718e3869dda48d25b7c5f0aaebf811b3af0a8b6e84
                                        • Instruction ID: a0d9417d776da062da08835513569a02ab4694ad8163f9220eef310ec3b38517
                                        • Opcode Fuzzy Hash: 84514e443a559a34d03d4f718e3869dda48d25b7c5f0aaebf811b3af0a8b6e84
                                        • Instruction Fuzzy Hash: 24F0F471B202119FDF0AE7B8884C4FF7BB6AF88390B180129D504E7280CA700D1187D5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 737e0141a1f8ca466daa8117603ab7e10902d619771aec81042ef1be95f49847
                                        • Instruction ID: a5aac86a5dfb9ea2a21afe3a66fec31c5b9f05b8b59eefef75c4304c39f13b3b
                                        • Opcode Fuzzy Hash: 737e0141a1f8ca466daa8117603ab7e10902d619771aec81042ef1be95f49847
                                        • Instruction Fuzzy Hash: 87F09671B202155B9F1AF6A9585C8FFBBBA9FC87D0B140129E505A7340DA701E1187D9
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0f367884dc3573c3d75640e49fd8b9622824a758760302a2edf57bd7f448f551
                                        • Instruction ID: a49b971ce9f4d4fec4545ceca5e3a32923edc69179dee636ec89b6961f699b63
                                        • Opcode Fuzzy Hash: 0f367884dc3573c3d75640e49fd8b9622824a758760302a2edf57bd7f448f551
                                        • Instruction Fuzzy Hash: 7DF09632264B0547E730CF69E84676677F6FF49391F180E29E06AC7240DFB0E40587A1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4abfb67f33507364977addc1d30c09f48b1dd693eb9ce5892e518ed01d996d23
                                        • Instruction ID: d56f6b1a295af3c6ca1c0c14d467d1c30f56d6f4e09071b16b3edf7798fb7803
                                        • Opcode Fuzzy Hash: 4abfb67f33507364977addc1d30c09f48b1dd693eb9ce5892e518ed01d996d23
                                        • Instruction Fuzzy Hash: C9F04C71A501059BC708FFB8C1212EEB6B6EF89200F10485DC402AB384CEB59D0587D7
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05d3d0f7e0865e0e5997f40b157f43b7e48bffef6754f58b8682887a274955c5
                                        • Instruction ID: f31512d19b5af6ca3d6d5931494fd50b690d59cb3fe61fc74c506da73b5fc089
                                        • Opcode Fuzzy Hash: 05d3d0f7e0865e0e5997f40b157f43b7e48bffef6754f58b8682887a274955c5
                                        • Instruction Fuzzy Hash: 8DF09A76B082645FD3148B7E9884DABBBE9FF8E26031980BAE548C7352C9309C00C7A0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d62f2d8eb7ff8bf6633f2ef48d29e74101f1f02e672800fa7d6573f6106101b8
                                        • Instruction ID: 140959f7c1463720e6f7cc0c9782e8c493824f26634aca43ee3a4fe7c8c81257
                                        • Opcode Fuzzy Hash: d62f2d8eb7ff8bf6633f2ef48d29e74101f1f02e672800fa7d6573f6106101b8
                                        • Instruction Fuzzy Hash: 84F0F630B601069BCB08BB6891106EEF6B2EF85300F00886DC502AB384CEB55D0587EB
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f4db7584172a897629a65ad0b998dc7774b219b91bf1a7f490679472b0fdad18
                                        • Instruction ID: 875f37783b9c4832ab0bd51ca8edc20a504f1cdb72ae87a11a29afbd3f0913c3
                                        • Opcode Fuzzy Hash: f4db7584172a897629a65ad0b998dc7774b219b91bf1a7f490679472b0fdad18
                                        • Instruction Fuzzy Hash: 7BF01231664B0547E731DE6CE846767B7F6FF44391F140E29E06AC7640DBB0E54487A1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3022481884bc5c2df67453b350bcb93b62278cd272cb94e8c0869ef020936c8f
                                        • Instruction ID: 1b8d8b5bcddac11a60e5f154ec04e7584aa01a7b61346ff4ab1593866c7a6805
                                        • Opcode Fuzzy Hash: 3022481884bc5c2df67453b350bcb93b62278cd272cb94e8c0869ef020936c8f
                                        • Instruction Fuzzy Hash: FD014C70C1425ADFEB21CF66C4043EEBBF1BF48394F15C665E829AA590D3B48A44CB80
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4af6f6a0c431bbe3c71c52b358b7daade526eae36f0f505abf21fa4e37f393d3
                                        • Instruction ID: 7daca96223cd3e50856f572a992bc4ee0ff0570a7c7d311493c95af96d0b8019
                                        • Opcode Fuzzy Hash: 4af6f6a0c431bbe3c71c52b358b7daade526eae36f0f505abf21fa4e37f393d3
                                        • Instruction Fuzzy Hash: 2601FF3150D7858FD326C73CC858BD27BB0AF07200F0A00EBE28AC77A2C6A1B800C751
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: afd948de0c9ce70c8fc4a38c311f65ece6cac2832ffff415753732e9eab4021d
                                        • Instruction ID: e1ecaff8214965f875848c7ca45d973d15191e8ba668569e2e09f67722c35d13
                                        • Opcode Fuzzy Hash: afd948de0c9ce70c8fc4a38c311f65ece6cac2832ffff415753732e9eab4021d
                                        • Instruction Fuzzy Hash: C8F0E222B143485FDB08DFB9A8295EE7FEA9F81290F1484BAD004C3651ED709900C380
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1773550687.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_122d000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8dbbea2a2d1805cecf490c02b93c65523c34c0358f35b3d3f96ddd82df4c18f5
                                        • Instruction ID: 6c7a54c1998ee5b2e2040762dc66794f6c1920a5df7c2e2a5063cacdd6ad11e5
                                        • Opcode Fuzzy Hash: 8dbbea2a2d1805cecf490c02b93c65523c34c0358f35b3d3f96ddd82df4c18f5
                                        • Instruction Fuzzy Hash: 6CF06271409394AEE7158E1ACCC8B66FFE8EB51734F18C45AEE485B286C27D9844CAB1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be90b31af99a7346e22ea1b81cd3f842d2a820edbea55872e9d19b569e6c8035
                                        • Instruction ID: 889a66d6accbe5cc687b935c9ebabd99af0df013c8840a5ffab255e4fe395c07
                                        • Opcode Fuzzy Hash: be90b31af99a7346e22ea1b81cd3f842d2a820edbea55872e9d19b569e6c8035
                                        • Instruction Fuzzy Hash: C1F0B472604108AFCF05DF94D8418DFBFB9EF05260B1581ABE808DB211E6309E10C791
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 259bacf75ed909c791f9f21647ce8bf33fe3027cdd5443bd5bb53bfefd5710c3
                                        • Instruction ID: 6fa1296ff9ed2061aebb62046d7a86604b0423c3cc17fde1c150a1a77f760537
                                        • Opcode Fuzzy Hash: 259bacf75ed909c791f9f21647ce8bf33fe3027cdd5443bd5bb53bfefd5710c3
                                        • Instruction Fuzzy Hash: 7FF0B4393053418FC706DF34D550DA93BEAEF8535031988AAE544CB325CB349C46CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cec2b7d58eba1aadd05cd562f9a351dcb26c940e7afba98f81362891bc4369e4
                                        • Instruction ID: bf7c4c908558498ce018639da707e1759ccd0bb0d060ac43dccd4a9dad2d1dd8
                                        • Opcode Fuzzy Hash: cec2b7d58eba1aadd05cd562f9a351dcb26c940e7afba98f81362891bc4369e4
                                        • Instruction Fuzzy Hash: DC01EC70C10219DFEB14CF6AC4043EE7BF1BF48394F148225E819AB190D7B48A40CF90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 14881eda9e3f5ae28df2d31289aaf3a77d1055ef08f34f7ed127f686a8453dd6
                                        • Instruction ID: bce6a6031c43e7a14eff53c836b47782796e53232ce1d23b85a125e922120efd
                                        • Opcode Fuzzy Hash: 14881eda9e3f5ae28df2d31289aaf3a77d1055ef08f34f7ed127f686a8453dd6
                                        • Instruction Fuzzy Hash: ABE0C9767041286F9314DA6ED884D6BBBEEFBDD664355817AE508C7314DA319C0186A0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f88a096a2e9576af1f647b09c6da8271e998bc3350795dbe49938241d65ea6b4
                                        • Instruction ID: 255d406b2e71a2e2cf96f390fe1c6c565896657c38732594c523ee44c310149a
                                        • Opcode Fuzzy Hash: f88a096a2e9576af1f647b09c6da8271e998bc3350795dbe49938241d65ea6b4
                                        • Instruction Fuzzy Hash: 31014C78905269CFCBA0CF64C940BADBBB6BB09201F1141E9E919A3311D7359E81DF01
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ed0232e4ba18e9626de920a780b50f6186968032185b68f801e3aacdcfc00be8
                                        • Instruction ID: b127b6f4053ac30524891a08cf676d453f7c32df29f8b6d61373ff628c1bc376
                                        • Opcode Fuzzy Hash: ed0232e4ba18e9626de920a780b50f6186968032185b68f801e3aacdcfc00be8
                                        • Instruction Fuzzy Hash: 93F030353512069FD705AF79D440DAA7BEEEF853503544469F904CB324DF759C46CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09ff99a331bc7fcbbfa448662cf000adf5a46dde42f4585439b4e5945c9f4c4a
                                        • Instruction ID: dcc939ecfe6ae8cc9dfab3a215172ca7b7828242051caa553a2011fed5d20c05
                                        • Opcode Fuzzy Hash: 09ff99a331bc7fcbbfa448662cf000adf5a46dde42f4585439b4e5945c9f4c4a
                                        • Instruction Fuzzy Hash: D2E06D71B406240B4B0CEB7EA50086AF6EBAEC8650314C06ED50EC7624EE70AC018A84
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d1c3a3f552c1112390426ef75272bd8bf56e1ef49a932003a074d3b0dcc31ace
                                        • Instruction ID: c39ddef2fea3d51cfaaa0998de71259c0de82de9bf527f4ca40846b9864709ef
                                        • Opcode Fuzzy Hash: d1c3a3f552c1112390426ef75272bd8bf56e1ef49a932003a074d3b0dcc31ace
                                        • Instruction Fuzzy Hash: CAF0DAF4D0420A9FDB44DFA9D846AAEBBF4BF48300F1046A9D918E7340E7749500CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4dde28f0ac919bd1a2583af3f42556b165cc201210c581e3ed91a9e646182c55
                                        • Instruction ID: fbabf54a8d3366a92fa5e65791796b852a3226dbbb97a8853798ef489b86e924
                                        • Opcode Fuzzy Hash: 4dde28f0ac919bd1a2583af3f42556b165cc201210c581e3ed91a9e646182c55
                                        • Instruction Fuzzy Hash: 64F0A07021A345DFC309AB39855042ABBA5DF4620075488BEE059CB662DA31DC84C742
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9853fd14e877cb5c8dab6f25a9a2cfb18674002a31ba345eeb31747453a33321
                                        • Instruction ID: 2f290992ce84214a3f55bad17da83c81b440b9df34461226fa8f1ed0a0571e6b
                                        • Opcode Fuzzy Hash: 9853fd14e877cb5c8dab6f25a9a2cfb18674002a31ba345eeb31747453a33321
                                        • Instruction Fuzzy Hash: D6F09035D04248AFCB52DBB4D5084CDBFF0AF06200B1082EAD455D3282EA311B46DB81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50acf3973c5c71a3f9247fee1a7b2cb2e4775cd153379cb9459a00b15f69ef78
                                        • Instruction ID: 6819ad493923b64c7334b2a6e1a53810abb26d5c3abf53306dba44cdf3a82857
                                        • Opcode Fuzzy Hash: 50acf3973c5c71a3f9247fee1a7b2cb2e4775cd153379cb9459a00b15f69ef78
                                        • Instruction Fuzzy Hash: 7EE0D821B147180B9615762A6D008B6B6AFBDC9740704C29ED00EC7112DDB09C4146D1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c6df731b060d74d9ab797bb23cb10b10a39587da7b6f0fc9453177ff7615531
                                        • Instruction ID: 994dcce3791a53b4460850cf2561bf7559e1f202eed06ed25e733ca75ea4151f
                                        • Opcode Fuzzy Hash: 3c6df731b060d74d9ab797bb23cb10b10a39587da7b6f0fc9453177ff7615531
                                        • Instruction Fuzzy Hash: 8BE0923365152487C310DF9CF4815B5B3A9FB44AA53288656E50CCE610F373E862C7C0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c5e1b422ced43c12d97f817e0e12accee32c6ec913e54c845adb68b7c1339213
                                        • Instruction ID: 0867c7d755373471683c9825afcc3ef0475b624d367182df44d683977751bc9c
                                        • Opcode Fuzzy Hash: c5e1b422ced43c12d97f817e0e12accee32c6ec913e54c845adb68b7c1339213
                                        • Instruction Fuzzy Hash: 28E06D31310610CFC354EB1DD844D0AB7EAEFCAB2176581AAE109CB321CA72EC01CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b52c3690683f92f64c58cf34c61ec80bc74fa10eab243955ca7beb09d23a3ad
                                        • Instruction ID: aa23d82134e6b57c215caf5a55453494db2cdde16c34663e1d229204d3d0a894
                                        • Opcode Fuzzy Hash: 3b52c3690683f92f64c58cf34c61ec80bc74fa10eab243955ca7beb09d23a3ad
                                        • Instruction Fuzzy Hash: 3AE0ED31350610CFC354EB5DD444C59B7EAEFCAB2576581AAE109CB721CA72EC01CB50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b743afe843da36a0a63a68e30093699ad679c5c6571b25d1aeb0774870810c33
                                        • Instruction ID: e8da0b6d682287abcae3b8d8082741c8fe38cc2cd6a0b71aeb096cc881d5f139
                                        • Opcode Fuzzy Hash: b743afe843da36a0a63a68e30093699ad679c5c6571b25d1aeb0774870810c33
                                        • Instruction Fuzzy Hash: D3E012B4B4611ACFEB10CB94E8C56ECB779EB45214F1052AED109D2254D7301995CE55
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e67ea5bba0a99129cbf0f938f613d8a8d881e2a3e06550380b33f8a25c1dbe2c
                                        • Instruction ID: 0d5921a9f33fb60df4b78e70439308c1d432f7f2022da972ede8ffd4ae987b64
                                        • Opcode Fuzzy Hash: e67ea5bba0a99129cbf0f938f613d8a8d881e2a3e06550380b33f8a25c1dbe2c
                                        • Instruction Fuzzy Hash: 05E092F2A11209EFCF00FFA0E99179C7BF9EB552007104195E804D3354EB326F049B65
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5a4d5aaba51fa8e1e33224708a2930eec9ea9014c04d35d1b3656a351856d86e
                                        • Instruction ID: 7ae1d9343803dc683cd74064b973e14e15f000591dbc994fc426592474b1b8e8
                                        • Opcode Fuzzy Hash: 5a4d5aaba51fa8e1e33224708a2930eec9ea9014c04d35d1b3656a351856d86e
                                        • Instruction Fuzzy Hash: D1E09A31D7068EDBEB149B80E1987FCBB71FF84396F200412E116B1480C7B205A4CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ccbccd3d631f080ce2309656447ee2a3dcbcb8d07337f169e69719fdabc409ec
                                        • Instruction ID: e8fb285302e8919feb34a66f6ce41bceef50f2ebd5b2520108a1871167c08ec3
                                        • Opcode Fuzzy Hash: ccbccd3d631f080ce2309656447ee2a3dcbcb8d07337f169e69719fdabc409ec
                                        • Instruction Fuzzy Hash: 07E092B5950105DFC760CFB8C906A8EBFF0AB04324F28C6AAC425CB661D739460A8F40
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 02ca975fac1efce48cd82e6f5a9e66c19b0eee04f6aadbc4276c9421d25bc518
                                        • Instruction ID: 9a05c4b2f2d07b510dde540aea91bc9e524eb705214d0f5c7973ab9e2fa89170
                                        • Opcode Fuzzy Hash: 02ca975fac1efce48cd82e6f5a9e66c19b0eee04f6aadbc4276c9421d25bc518
                                        • Instruction Fuzzy Hash: 68E09AB16013008FC318EF64D200659BBA2EB46310B1485BEC00A8B362DA32D840CB82
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c0d4f7f0e20511484aa178b96375754669449b5ce845d21c5b92f0a3238b6a3b
                                        • Instruction ID: 24c8300958ec3697a949678e310a5f63f0774865a3dc716b29e88449f43ce206
                                        • Opcode Fuzzy Hash: c0d4f7f0e20511484aa178b96375754669449b5ce845d21c5b92f0a3238b6a3b
                                        • Instruction Fuzzy Hash: 43E0C232A2A1904FD315AAAC955C8EA3BE8AF0A260B0500E7E14DCB223DA918D008396
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: befed6f083f2b535437883940d204bd2a8c7fd0e9c7fc814d3c99f1656a62343
                                        • Instruction ID: 9c3130f5c6ceff1e5fa5a25e9f263edaba4d6dec0d161b19346819711f52ff5f
                                        • Opcode Fuzzy Hash: befed6f083f2b535437883940d204bd2a8c7fd0e9c7fc814d3c99f1656a62343
                                        • Instruction Fuzzy Hash: F1D012363104105B8704965DE404C9AB7EDDFC9621322806AF119C7321DA71EC028B91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de83fced491a2a6d694dac482b14b31260cc54b66adbe9fb5ce946f787398ec7
                                        • Instruction ID: b60e1b40edb7bf4a8437774e6869de1270fa65bcea72563ff42e7a2028ab0ea1
                                        • Opcode Fuzzy Hash: de83fced491a2a6d694dac482b14b31260cc54b66adbe9fb5ce946f787398ec7
                                        • Instruction Fuzzy Hash: BBE02EB180E7858EDB42E3389A000CD7FB4FD3310871A839BC0C2DA013E104A26FC7A2
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aef9a1ea6a165994e1d9497c51dffc73f18fe3b66419b137b48b9d08f23c92b5
                                        • Instruction ID: 16842c0a551668d163a37d4d8d82b3ff09a254ba2ba7ce7ce6d59145de8f2bc4
                                        • Opcode Fuzzy Hash: aef9a1ea6a165994e1d9497c51dffc73f18fe3b66419b137b48b9d08f23c92b5
                                        • Instruction Fuzzy Hash: BDF015F0E0024A9FDB14CFA9C446AAEBFF0BF08314F108699E920EB281DB34D100CB90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aafef88b72b9bd64744f7cf2911bc9f2565af1c94ec5f43c69b923993b34b6c8
                                        • Instruction ID: 9cefdcfa8d6bee26a6c7b02784222dd7fb942b74403dca22f160b6a0cd22197c
                                        • Opcode Fuzzy Hash: aafef88b72b9bd64744f7cf2911bc9f2565af1c94ec5f43c69b923993b34b6c8
                                        • Instruction Fuzzy Hash: E6E06DB582C507CFCF40CF64D45A4BE7BF5FF06301F1401AA95259B156C3206400DF92
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 591483b2de7241fef17ce5fdce4889f66c78c2c27672c3bf06f5c7c13138a9c1
                                        • Instruction ID: 50ffda8969100d633c1367d241f50002466839a94e08f617b5d8bd2fa08609cc
                                        • Opcode Fuzzy Hash: 591483b2de7241fef17ce5fdce4889f66c78c2c27672c3bf06f5c7c13138a9c1
                                        • Instruction Fuzzy Hash: E8E0E6B0A11109EFCB40FFA4E54165D7BF5FB442047204554E805D3358DB326F149B55
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4cb9bb5938e088f760ace863695e45cdcbe800bf5e1e7713413d410da321594
                                        • Instruction ID: dfecd9468e565b4f2b690e9703d8f8ed57e5881e7aa1c261d212e60de0efda3c
                                        • Opcode Fuzzy Hash: a4cb9bb5938e088f760ace863695e45cdcbe800bf5e1e7713413d410da321594
                                        • Instruction Fuzzy Hash: 0EE07575D0020CEFCB81DFA4D5498DDBBB9EB48200F1082A69809E2240EA305B559B80
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15327a7fdee35865962fc5f9fd84c2c30892e012df4763a434a2e2393a466e5f
                                        • Instruction ID: 84c13cb93daee099e3ed36c9553e92262f9cf9209fe25e83223b9e4abee7aef8
                                        • Opcode Fuzzy Hash: 15327a7fdee35865962fc5f9fd84c2c30892e012df4763a434a2e2393a466e5f
                                        • Instruction Fuzzy Hash: EBD0C7323104145F8744965EE808C5AB7EDDFCEA21311407AF209C7371DE61DC0287D4
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4db7c626cba804fb09610dab2fcae27da6297a65d306d09f1f996c1873f884b
                                        • Instruction ID: f6291df213e054fef46911ccae5223bcc9b0b3efbda0fcba9d036bf4a57377d7
                                        • Opcode Fuzzy Hash: d4db7c626cba804fb09610dab2fcae27da6297a65d306d09f1f996c1873f884b
                                        • Instruction Fuzzy Hash: 2BD017B6C20139978B10ABA99C094EEFA79EF09790B418122E965AB500D2B04A21EBC1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 97cde4871a1bf205a7b18a13b7ebb65fb3c6343973a43af311da26fbb7a935da
                                        • Instruction ID: e2ab87c773c7f0199696b7907aa9d286ccda81cb360e6548d9b4d2627ecec22b
                                        • Opcode Fuzzy Hash: 97cde4871a1bf205a7b18a13b7ebb65fb3c6343973a43af311da26fbb7a935da
                                        • Instruction Fuzzy Hash: B1E0BF34254A558FD324DB6CD448FE677D4AF0A715F0504EAE65A97371C6B1AC40C750
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a3f183dc7e4d9b5efed526fb066fb53b0e368261fa5b69d286f9472460c78ce2
                                        • Instruction ID: 2104ada3c06271b55bd61f8c663208a3f798c6552388051e6ee28014092aa73d
                                        • Opcode Fuzzy Hash: a3f183dc7e4d9b5efed526fb066fb53b0e368261fa5b69d286f9472460c78ce2
                                        • Instruction Fuzzy Hash: 2FE092B0D40209DFDB50EFB9C946A5EBBF0AB08204F11C6A9D419E7221E7B496088F91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0f472fdf1ab13025a76f7367e840f0a4ae1f1973b587a4e553618a2b48c2c42c
                                        • Instruction ID: 29387c7a790d89567fe4b38d14d658452b18a93a25d06be386b0bd1c879648bc
                                        • Opcode Fuzzy Hash: 0f472fdf1ab13025a76f7367e840f0a4ae1f1973b587a4e553618a2b48c2c42c
                                        • Instruction Fuzzy Hash: 02E0C2E052C39AEFC7134720451A3697FA46F03280B6C03AFE480C9166CD2AC84CCB22
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d9424b7a95e86d21833ab1b46b74e36f09dc79bfd94f3c58f43b0871fc0f531
                                        • Instruction ID: e49326a731e9338bc9e15fb2ae851c2ebf0c2cfe15bf7290a7547059875e5089
                                        • Opcode Fuzzy Hash: 6d9424b7a95e86d21833ab1b46b74e36f09dc79bfd94f3c58f43b0871fc0f531
                                        • Instruction Fuzzy Hash: 16D01233520164AFD714A648E548BD07769FF01361F464065E549D7240CBF9FC908B95
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                        • Instruction ID: 2686e6cacb94319156c13be3e78915db5e440f29521b68a0432c55ab4247cf35
                                        • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                        • Instruction Fuzzy Hash: 9ED05E72C10138978B10AFE99C044DFFF79EF05750B418122E914A7100D3B00A20DBC0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cabc0c046a6bc6fe512279a55cbd5f662b433fde26933e8b89a414b629903e3e
                                        • Instruction ID: ef509204ec326c40f680734c8041defa7d2ee9683f90f40c832a2c5e5a38b6c7
                                        • Opcode Fuzzy Hash: cabc0c046a6bc6fe512279a55cbd5f662b433fde26933e8b89a414b629903e3e
                                        • Instruction Fuzzy Hash: 74D05E301982489FCB01CB54CD09D59BF64EF06620B0580E6E948CF273C231D809EB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d52c18c111b87c0baf744b3c8b28ef3b5b59ae647ef38976bf96dd116c4b03e8
                                        • Instruction ID: 95c57beccd14246dcf8c5bbc9ae86ff7cb351c579d164f9589973cb1e9fee7c4
                                        • Opcode Fuzzy Hash: d52c18c111b87c0baf744b3c8b28ef3b5b59ae647ef38976bf96dd116c4b03e8
                                        • Instruction Fuzzy Hash: 26E0EC74650105CFEB04DF64C594AAD77F2FF48305F254458D401AB361CB75AD41CF50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e37d5013082f16f181e3e671ef8ff4b380ea3c5e5bdacb2a14b5c8c1e849c693
                                        • Instruction ID: a3f6c2dbb11c8aac73db8662f0ebfa6efd9696fae83ff862612a944da7b18b1d
                                        • Opcode Fuzzy Hash: e37d5013082f16f181e3e671ef8ff4b380ea3c5e5bdacb2a14b5c8c1e849c693
                                        • Instruction Fuzzy Hash: 09D05E766091949FCB43DB989944C8ABFB5AF49614704C0FFE148CF026D226D816D781
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd0cafa4d785de508543922728789b5b6f92f000ee5942631623c4774155d6d1
                                        • Instruction ID: 7cd4091c9e397270cfdbf17d67f018c5655501503af8d9262c347c5dcee1bbdf
                                        • Opcode Fuzzy Hash: bd0cafa4d785de508543922728789b5b6f92f000ee5942631623c4774155d6d1
                                        • Instruction Fuzzy Hash: 69D092B7D100299B8B10AFE8AE055EFFE75EF48B51B418166E925A7514D3B04A21DBC0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 537860d874f4020d24a7c116cb488073df998ae32d03214f993830b3084e000f
                                        • Instruction ID: 3a57be18d34892c0d50bfebf73494bb1ca6a7c6597f9c6d5b8e7c38ad58db9a3
                                        • Opcode Fuzzy Hash: 537860d874f4020d24a7c116cb488073df998ae32d03214f993830b3084e000f
                                        • Instruction Fuzzy Hash: 65D0127615410C9F8F80EF95E900DA777DCBF14700700856AE504CB121F621F438D792
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 30229ba77c1075d31fba23e0b32a916e34a49b3f87f64825d6d632054dbbae55
                                        • Instruction ID: 1dd1a8b1e3af53aacfaa298f473c3e25268278b738c1c915649291ca75a7b87d
                                        • Opcode Fuzzy Hash: 30229ba77c1075d31fba23e0b32a916e34a49b3f87f64825d6d632054dbbae55
                                        • Instruction Fuzzy Hash: 2FC012313100244BC608665CE4088EA37DC9F4965170100A6E109C7321CA919C0047D5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c0e461ea583c063f2303c3e7985058141db0bbdd4416f4eeee03c1ccc14b230f
                                        • Instruction ID: 5cee878b238fd765292b0b58ba2d3c619ca72a57d2f368f60cf975db9355c612
                                        • Opcode Fuzzy Hash: c0e461ea583c063f2303c3e7985058141db0bbdd4416f4eeee03c1ccc14b230f
                                        • Instruction Fuzzy Hash: EAC01232100018BF4A01AB89D940CCAFBADAF49654304C056F5088B121D622E51297D1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 03620256cda3dddcf827c163af1fed353327c7b0ff480bd7c0a680fc317654b5
                                        • Instruction ID: e367c6f45d1881dd719f7afb01b830327e8d5e8e5c33f454dcbaacfd1edf94f9
                                        • Opcode Fuzzy Hash: 03620256cda3dddcf827c163af1fed353327c7b0ff480bd7c0a680fc317654b5
                                        • Instruction Fuzzy Hash: 3BB09B2131513917D708319E64245FD728D4BC5665F540067D50D97741CCC59C5103DE
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1eacb50fe27bac19ea5025f216ce5d57aa2dfb2a2e00cf53a5c7e0e18b19d7d4
                                        • Instruction ID: a1105a5d11d8490c57a06a2fe98b5b7aede90ae80c594b81adaebfd8800f57bb
                                        • Opcode Fuzzy Hash: 1eacb50fe27bac19ea5025f216ce5d57aa2dfb2a2e00cf53a5c7e0e18b19d7d4
                                        • Instruction Fuzzy Hash: 25C01236240208BFEA80AA98D800D96776DAB18B10F909000BA080A201C2B2E862DBA1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d9af9565452834d2ccc3522f1c7b6b650eae493572d2dfebbd35c57667dccd9b
                                        • Instruction ID: b5671d49b78e568f503e98d5d1b9ff59f1f04e3c1c805e8bca695bc391373213
                                        • Opcode Fuzzy Hash: d9af9565452834d2ccc3522f1c7b6b650eae493572d2dfebbd35c57667dccd9b
                                        • Instruction Fuzzy Hash: AEC08CB004320887C39467A4F80E32837ACEB00322F004124B149001509F6A6094C622
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 924ac4ab79ebb1c5a67645afc796d178ccaaa431615dbb46934f2aadbafa5b75
                                        • Instruction ID: de704306359a37069860170d5dfc453ed4c42ce0e788a102fa6afc437f0b56d0
                                        • Opcode Fuzzy Hash: 924ac4ab79ebb1c5a67645afc796d178ccaaa431615dbb46934f2aadbafa5b75
                                        • Instruction Fuzzy Hash: EFC09B35174005AE9B41EB64CAD4DA6FAA5FF55340FC1CC61A25645135CBE1C928DF13
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                        • Instruction ID: 61412fa5721fa0801f19765b42d0f6ac58f054d2697597a3f249e516f761f0d5
                                        • Opcode Fuzzy Hash: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                        • Instruction Fuzzy Hash: 87C00235140108AFC740DF55D445D95BBA9EB59660B1180A1F9484B722C632E9119A90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bcecf41bf6be32cba5369f52163384345a5af959d58752f9783051225b9be534
                                        • Instruction ID: c4beee2e631aa892c3f3d2a90aacff4e84a37c751d2850e406927ced4c1dc1a6
                                        • Opcode Fuzzy Hash: bcecf41bf6be32cba5369f52163384345a5af959d58752f9783051225b9be534
                                        • Instruction Fuzzy Hash: 28B09234A44214CFC708DB30C96085873A2FF8C39236A8868C001DF224CA359881CF10
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1781243025.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_70c0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f85a1fd03dbf86fccadd06840a6a3273f4c57a8a0f7bec90d2039d89f08b89b
                                        • Instruction ID: 44694575b838da228c303e7058c825bced0c228f5e16f0333919f615da3f2187
                                        • Opcode Fuzzy Hash: 3f85a1fd03dbf86fccadd06840a6a3273f4c57a8a0f7bec90d2039d89f08b89b
                                        • Instruction Fuzzy Hash: 05B09271105314CFC318DB20D248AAC3777BB0E202F40059CD00A5A252C776E881CE00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q
                                        • API String ID: 0-1614139903
                                        • Opcode ID: 09ec890a6fee8d6b56e91146f0420d7309feee21909c88fa22b19cfa1b331fe8
                                        • Instruction ID: e0f1b5a59bb150371ebe75467a711c48a9c6e258e9c382f3fef36f5bbaaecac0
                                        • Opcode Fuzzy Hash: 09ec890a6fee8d6b56e91146f0420d7309feee21909c88fa22b19cfa1b331fe8
                                        • Instruction Fuzzy Hash: 36F17E30A04399DFDB46EFB8C954BAE7FB2EF89300F148496D401A73A9CA359D85CB51
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 96e241dfee9ca8460f7c12d51b8f4ad105a626cb66f891454f7cb05f3f7d7d1b
                                        • Instruction ID: 832a54af09d0aabb2c209663f48ae3dde45f38bfe66ad2bcb71e77354478e4ad
                                        • Opcode Fuzzy Hash: 96e241dfee9ca8460f7c12d51b8f4ad105a626cb66f891454f7cb05f3f7d7d1b
                                        • Instruction Fuzzy Hash: EAC1C930B007148FDBAADB39C954BAEB7EAAF89304F20446DD186CB290DF35E841CB51
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 91d7f99016846d8ad76990733439a219347379945f0bec2ae07b23ab7f0e1062
                                        • Instruction ID: a1ea3cff5365e135775fb72af3fab55d730c21b4170d6324bd066e3ee96bd657
                                        • Opcode Fuzzy Hash: 91d7f99016846d8ad76990733439a219347379945f0bec2ae07b23ab7f0e1062
                                        • Instruction Fuzzy Hash: 0512B7F0C82B458AE310CF65EA4C3897BB1BB85399BE04F09D2619F2E5D7B4116ACF54
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e560858a1471ec0aa82b094ce6276ae68a763443bda97af5043d93fde112ac81
                                        • Instruction ID: bb4844e5d8d40127c30ba23fa02a0d09b466cf142bffdca8c2def4203d51ae11
                                        • Opcode Fuzzy Hash: e560858a1471ec0aa82b094ce6276ae68a763443bda97af5043d93fde112ac81
                                        • Instruction Fuzzy Hash: 03E11774E102298FCB14DFA9C5849AEFBB2FF88304F249169D554AB355D731AD42CF60
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f694661dc7d8069ad261c81fb7a9c38d6bc43f1f7fd5878c06d0f5a58a6ee60d
                                        • Instruction ID: b4801abbe2465971e6fd7694bc53fae473a4b1511edc8a3063b6da9223d456bb
                                        • Opcode Fuzzy Hash: f694661dc7d8069ad261c81fb7a9c38d6bc43f1f7fd5878c06d0f5a58a6ee60d
                                        • Instruction Fuzzy Hash: 81E11874E002298FCB14DFA9C584AAEFBB2FF89304F249169D554AB35AD730AD41CF60
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 639b69d4ce85096a7db254935c16b046a1b479ff419952f0857e720bfed059a5
                                        • Instruction ID: fa8a59e1ea7492fd80c963b337daebbd5747d8328ab08ed607ac5be3fa76fb66
                                        • Opcode Fuzzy Hash: 639b69d4ce85096a7db254935c16b046a1b479ff419952f0857e720bfed059a5
                                        • Instruction Fuzzy Hash: EAE1E774E10229CFCB54DFA9C5849AEBBF2FF89304F249169E414AB356D731A942CF60
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9cf64c691e4f2f6d1111b8744b4738a8cb02017de1ee7c60b8b960fb435e9e80
                                        • Instruction ID: 8acc1121a349c3895ba109027542d6b077807fe0ad1766a86cfc7b7b67317ab0
                                        • Opcode Fuzzy Hash: 9cf64c691e4f2f6d1111b8744b4738a8cb02017de1ee7c60b8b960fb435e9e80
                                        • Instruction Fuzzy Hash: 1AE11874E002198FCB15DFA9C5849AEFBB2FF88304F249169E554AB35AD730AD41CFA0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7579405fb9973464a8f5102a3242de951b9b1e4b419875ea97e03ef4423f08c
                                        • Instruction ID: ad1f8102c12dad532561ff0827fbf3c699a1199616646af0f3b96fdc2cd8922a
                                        • Opcode Fuzzy Hash: b7579405fb9973464a8f5102a3242de951b9b1e4b419875ea97e03ef4423f08c
                                        • Instruction Fuzzy Hash: D7E11974E102298FCB14DFA9C584AAEFBB2FF88304F249169D544AB356D730AD41CFA0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4cb80d882148fedb5c40396ed4fe7bf45827162566dc02fd973dcc6f9f159422
                                        • Instruction ID: 3ef2247d48fdb0e19acc8a867c8ea6f68ea1a4058fa597311cc93e88c8c7fc70
                                        • Opcode Fuzzy Hash: 4cb80d882148fedb5c40396ed4fe7bf45827162566dc02fd973dcc6f9f159422
                                        • Instruction Fuzzy Hash: 65E1163192065ACECB01EB64D994A9DF771FF95300F10CB9AE409B7214EB70AAC9CF91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35c631d04f416e6eb21c4a977fec5a8806079ee17b2872c0b1ecbbd77c62a103
                                        • Instruction ID: b6771742031cdb55cc77e2c5798bc80b9e26c75e54148aa31d774610c3a266d9
                                        • Opcode Fuzzy Hash: 35c631d04f416e6eb21c4a977fec5a8806079ee17b2872c0b1ecbbd77c62a103
                                        • Instruction Fuzzy Hash: ABD1F53192065ACECB11EB64D994A9DF771FF95300F10CB9AE409B7214EB70AAC9CF91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77bb73e0e3ecff3e1ba34eba815251a580c2448620fa362ddf53cf9bc47b1eaf
                                        • Instruction ID: 1c537a37d18e6a95df52f447a2f9b056159565f58d7a3f87af44ba9422c1fb05
                                        • Opcode Fuzzy Hash: 77bb73e0e3ecff3e1ba34eba815251a580c2448620fa362ddf53cf9bc47b1eaf
                                        • Instruction Fuzzy Hash: 1BD1F53192065ADACB01EB64D994A9DF771FF95300F10CB9AE40977214EB70AAC9CF91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9fa14bb50fb1a1c51c05bf7b5d33f7e4ef4966ebe3f1938ea85daf002a8ae31d
                                        • Instruction ID: 2af2a8cfe72e11716024de503121732d3e4d11d4487397d582c79e9af1710701
                                        • Opcode Fuzzy Hash: 9fa14bb50fb1a1c51c05bf7b5d33f7e4ef4966ebe3f1938ea85daf002a8ae31d
                                        • Instruction Fuzzy Hash: 97A16132E006059FCF05DFB4C9449AEB7F2FF88300B258569E906AB265EB71E955CF90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779587366.00000000051D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_51d0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 62060bad66dd607306c9f2809d767d04fa7c542ce0fb2cb085d8ae1064d1ba70
                                        • Instruction ID: 246c9567dc3bed15c079462942d243eac2ab83c3eda28a49c0111ba85316c3c7
                                        • Opcode Fuzzy Hash: 62060bad66dd607306c9f2809d767d04fa7c542ce0fb2cb085d8ae1064d1ba70
                                        • Instruction Fuzzy Hash: 7CC11CB0C82B468FD710CF65EA483897BB1FB89395FA04F09D161AB2E4DBB41466CF54
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1780530531.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_6e30000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e3dfa52c7679a384927a6715988c5486377ac51b824d7d4b7ab61261260cd097
                                        • Instruction ID: faae31beef7e0de05e8807aec5478205044122f37ab5420d4e0c47f01b116d90
                                        • Opcode Fuzzy Hash: e3dfa52c7679a384927a6715988c5486377ac51b824d7d4b7ab61261260cd097
                                        • Instruction Fuzzy Hash: 92513A74E002198FCB14CFA9D5845AEFBB2FF89304F24C16AD558AB316D7319A42CFA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q
                                        • API String ID: 0-2822668367
                                        • Opcode ID: 3895291df4590b8293798f61f97597b9fa64b1146657020878889222413663a7
                                        • Instruction ID: aa131700a44d50e8521f43396edd0c2817fcf9fb30cc89ed9ab935a75c6e2227
                                        • Opcode Fuzzy Hash: 3895291df4590b8293798f61f97597b9fa64b1146657020878889222413663a7
                                        • Instruction Fuzzy Hash: 4B412170D422069FCB08EF65E4517AEBBB2FB44240BC049A9D005DF6A8EF356D59CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.1779760890.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_52b0000_pvTSOIBBT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q
                                        • API String ID: 0-2822668367
                                        • Opcode ID: 5bf0e9be0cf1a7e533d139ec8b88bd60fd614c8d5fe216b438e68ab113b908d9
                                        • Instruction ID: 29052c95addd9c19fae4c65514d0720055d191567d800abef7b7ef61394d5600
                                        • Opcode Fuzzy Hash: 5bf0e9be0cf1a7e533d139ec8b88bd60fd614c8d5fe216b438e68ab113b908d9
                                        • Instruction Fuzzy Hash: 6041F170D421069FCB08EF65E4516AEB7B2FB442407D04EA9D005EF2A8EF356D59CF91

                                        Execution Graph

                                        Execution Coverage:1.2%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:4.4%
                                        Total number of Nodes:545
                                        Total number of Limit Nodes:10
                                        execution_graph 46472 404e26 WaitForSingleObject 46473 404e40 SetEvent CloseHandle 46472->46473 46474 404e57 closesocket 46472->46474 46475 404ed8 46473->46475 46476 404e64 46474->46476 46477 404e7a 46476->46477 46485 4050e4 83 API calls 46476->46485 46479 404e8c WaitForSingleObject 46477->46479 46480 404ece SetEvent CloseHandle 46477->46480 46486 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46479->46486 46480->46475 46482 404e9b SetEvent WaitForSingleObject 46487 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46482->46487 46484 404eb3 SetEvent CloseHandle CloseHandle 46484->46480 46485->46477 46486->46482 46487->46484 46488 434918 46489 434924 CallCatchBlock 46488->46489 46514 434627 46489->46514 46491 43492b 46493 434954 46491->46493 46810 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 46491->46810 46499 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46493->46499 46811 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46493->46811 46495 43496d 46513 434973 CallCatchBlock 46495->46513 46812 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46495->46812 46497 4349f3 46525 434ba5 46497->46525 46499->46497 46813 443487 35 API calls 5 library calls 46499->46813 46508 434a1f 46510 434a28 46508->46510 46814 443462 28 API calls _abort 46508->46814 46815 43479e 13 API calls 2 library calls 46510->46815 46515 434630 46514->46515 46816 434cb6 IsProcessorFeaturePresent 46515->46816 46517 43463c 46817 438fb1 10 API calls 4 library calls 46517->46817 46519 434641 46524 434645 46519->46524 46818 44415f 46519->46818 46522 43465c 46522->46491 46524->46491 46884 436f10 46525->46884 46528 4349f9 46529 444223 46528->46529 46886 44f0d9 46529->46886 46531 44422c 46532 434a02 46531->46532 46890 446895 35 API calls 46531->46890 46534 40ea00 46532->46534 46892 41cbe1 LoadLibraryA GetProcAddress 46534->46892 46536 40ea1c GetModuleFileNameW 46897 40f3fe 46536->46897 46538 40ea38 46912 4020f6 46538->46912 46541 4020f6 28 API calls 46542 40ea56 46541->46542 46918 41beac 46542->46918 46546 40ea68 46944 401e8d 46546->46944 46548 40ea71 46549 40ea84 46548->46549 46550 40eace 46548->46550 46974 40fbee 95 API calls 46549->46974 46950 401e65 22 API calls 46550->46950 46553 40eade 46951 401e65 22 API calls 46553->46951 46554 40ea96 46975 401e65 22 API calls 46554->46975 46556 40eaa2 46976 410f72 36 API calls __EH_prolog 46556->46976 46558 40eafd 46952 40531e 28 API calls 46558->46952 46561 40eb0c 46953 406383 28 API calls 46561->46953 46562 40eab4 46977 40fb9f 77 API calls 46562->46977 46565 40eb18 46954 401fe2 46565->46954 46566 40eabd 46978 40f3eb 70 API calls 46566->46978 46572 401fd8 11 API calls 46574 40ef36 46572->46574 46573 401fd8 11 API calls 46575 40eb36 46573->46575 46805 443396 GetModuleHandleW 46574->46805 46966 401e65 22 API calls 46575->46966 46577 40eb3f 46967 401fc0 28 API calls 46577->46967 46579 40eb4a 46968 401e65 22 API calls 46579->46968 46581 40eb63 46969 401e65 22 API calls 46581->46969 46583 40eb7e 46584 40ebe9 46583->46584 46979 406c59 28 API calls 46583->46979 46970 401e65 22 API calls 46584->46970 46587 40ebab 46588 401fe2 28 API calls 46587->46588 46589 40ebb7 46588->46589 46591 401fd8 11 API calls 46589->46591 46590 40ebf6 46608 40ec3d 46590->46608 46981 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 46590->46981 46592 40ebc0 46591->46592 46980 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 46592->46980 46594 40ec43 46597 40eac6 46594->46597 46983 41b354 33 API calls 46594->46983 46597->46572 46599 40ec21 46599->46608 46982 4139e4 30 API calls 46599->46982 46600 40ebdf 46600->46584 46602 40f38a 46600->46602 46601 40ec5e 46603 40ecb1 46601->46603 46984 407751 RegOpenKeyExA RegQueryValueExA RegCloseKey 46601->46984 47066 4139e4 30 API calls 46602->47066 46989 401e65 22 API calls 46603->46989 46971 40d0a4 46608->46971 46609 40f3a0 47067 4124b0 65 API calls ___scrt_get_show_window_mode 46609->47067 46610 40ecba 46619 40ecc6 46610->46619 46620 40eccb 46610->46620 46611 40ec79 46613 40ec87 46611->46613 46614 40ec7d 46611->46614 46987 401e65 22 API calls 46613->46987 46985 407773 30 API calls 46614->46985 46616 40f388 47068 41bcef 28 API calls 46616->47068 46990 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 46619->46990 46991 401e65 22 API calls 46620->46991 46621 40ec82 46986 40729b 97 API calls 46621->46986 46623 40f3ba 47069 413a5e RegOpenKeyExW RegDeleteValueW 46623->47069 46626 40ecd4 46992 41bcef 28 API calls 46626->46992 46628 40ec90 46628->46603 46632 40ecac 46628->46632 46629 40ecdf 46993 401f13 28 API calls 46629->46993 46988 40729b 97 API calls 46632->46988 46633 40f3cd 47070 401f09 11 API calls 46633->47070 46634 40ecea 46994 401f09 11 API calls 46634->46994 46638 40f3d7 47071 401f09 11 API calls 46638->47071 46639 40ecf3 46995 401e65 22 API calls 46639->46995 46642 40f3e0 47072 40dd7d 27 API calls 46642->47072 46643 40ecfc 46996 401e65 22 API calls 46643->46996 46645 40f3e5 47073 414f65 167 API calls 46645->47073 46649 40ed16 46997 401e65 22 API calls 46649->46997 46651 40ed30 46998 401e65 22 API calls 46651->46998 46653 40ed49 46654 40edbb 46653->46654 46999 401e65 22 API calls 46653->46999 46655 40edc5 46654->46655 46662 40ef41 ___scrt_get_show_window_mode 46654->46662 46657 40edce 46655->46657 46665 40ee4a 46655->46665 47005 401e65 22 API calls 46657->47005 46659 40edd7 47006 401e65 22 API calls 46659->47006 46660 40ed5e _wcslen 46660->46654 47000 401e65 22 API calls 46660->47000 47016 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 46662->47016 46664 40ede9 47007 401e65 22 API calls 46664->47007 46688 40ee45 ___scrt_get_show_window_mode 46665->46688 46666 40ed79 46667 40ed80 46666->46667 47001 401e65 22 API calls 46667->47001 46671 40edfb 47008 401e65 22 API calls 46671->47008 46672 40ed8e 47002 40da6f 31 API calls 46672->47002 46673 40ef8c 47017 401e65 22 API calls 46673->47017 46676 40efb1 47018 402093 28 API calls 46676->47018 46678 40ee24 47009 401e65 22 API calls 46678->47009 46679 40eda1 47003 401f13 28 API calls 46679->47003 46683 40edad 47004 401f09 11 API calls 46683->47004 46684 40ee35 47010 40ce34 45 API calls _wcslen 46684->47010 46685 40efc3 47019 4137aa 14 API calls 46685->47019 46687 40edb6 46687->46654 46688->46665 47011 413982 31 API calls 46688->47011 46692 40eede ctype 47012 401e65 22 API calls 46692->47012 46693 40efd9 47020 401e65 22 API calls 46693->47020 46695 40efe5 47021 43bb2c 39 API calls _swprintf 46695->47021 46698 40eff2 46700 40f01f 46698->46700 47022 41ce2c 86 API calls ___scrt_get_show_window_mode 46698->47022 46699 40eef5 46699->46673 47013 401e65 22 API calls 46699->47013 47023 402093 28 API calls 46700->47023 46703 40ef12 47014 41bcef 28 API calls 46703->47014 46704 40f003 CreateThread 46704->46700 47162 41d4ee 10 API calls 46704->47162 46707 40f034 47024 402093 28 API calls 46707->47024 46708 40ef1e 47015 40f4af 103 API calls 46708->47015 46711 40f043 47025 41b580 79 API calls 46711->47025 46712 40ef23 46712->46673 46714 40ef2a 46712->46714 46714->46597 46715 40f048 47026 401e65 22 API calls 46715->47026 46717 40f054 47027 401e65 22 API calls 46717->47027 46719 40f066 47028 401e65 22 API calls 46719->47028 46721 40f086 47029 43bb2c 39 API calls _swprintf 46721->47029 46723 40f093 47030 401e65 22 API calls 46723->47030 46725 40f09e 47031 401e65 22 API calls 46725->47031 46727 40f0af 47032 401e65 22 API calls 46727->47032 46729 40f0c4 47033 401e65 22 API calls 46729->47033 46731 40f0d5 46732 40f0dc StrToIntA 46731->46732 47034 409e1f 169 API calls _wcslen 46732->47034 46734 40f0ee 47035 401e65 22 API calls 46734->47035 46736 40f0f7 46737 40f13c 46736->46737 47036 43455e 46736->47036 47044 401e65 22 API calls 46737->47044 46742 40f11f 46745 40f126 CreateThread 46742->46745 46743 40f194 47046 401e65 22 API calls 46743->47046 46744 40f14c 46744->46743 46746 43455e new 22 API calls 46744->46746 46745->46737 47166 41a045 102 API calls __EH_prolog 46745->47166 46748 40f161 46746->46748 47045 401e65 22 API calls 46748->47045 46750 40f173 46753 40f17a CreateThread 46750->46753 46751 40f207 47052 401e65 22 API calls 46751->47052 46752 40f19d 46752->46751 47047 401e65 22 API calls 46752->47047 46753->46743 47163 41a045 102 API calls __EH_prolog 46753->47163 46756 40f1b9 47048 401e65 22 API calls 46756->47048 46757 40f255 47057 41b69e 79 API calls 46757->47057 46758 40f210 46758->46757 47053 401e65 22 API calls 46758->47053 46761 40f1ce 47049 40da23 31 API calls 46761->47049 46763 40f225 47054 401e65 22 API calls 46763->47054 46764 40f25e 47058 401f13 28 API calls 46764->47058 46766 40f269 47059 401f09 11 API calls 46766->47059 46770 40f1e1 47050 401f13 28 API calls 46770->47050 46771 40f272 CreateThread 46776 40f293 CreateThread 46771->46776 46777 40f29f 46771->46777 47164 40f7e2 120 API calls 46771->47164 46772 40f23a 47055 43bb2c 39 API calls _swprintf 46772->47055 46775 40f1ed 47051 401f09 11 API calls 46775->47051 46776->46777 47165 412132 137 API calls 46776->47165 46779 40f2b4 46777->46779 46780 40f2a8 CreateThread 46777->46780 46784 40f307 46779->46784 47060 402093 28 API calls 46779->47060 46780->46779 47167 412716 38 API calls ___scrt_get_show_window_mode 46780->47167 46782 40f1f6 CreateThread 46782->46751 47168 401be9 49 API calls 46782->47168 46783 40f247 47056 40c19d 7 API calls 46783->47056 47062 41353a RegOpenKeyExA RegQueryValueExA RegCloseKey 46784->47062 46787 40f2d7 47061 4052fd 28 API calls 46787->47061 46791 40f31f 46791->46642 47063 41bcef 28 API calls 46791->47063 46796 40f338 47064 413656 31 API calls 46796->47064 46800 40f34e 47065 401f09 11 API calls 46800->47065 46802 40f381 DeleteFileW 46802->46616 46803 40f359 46802->46803 46803->46616 46803->46802 46804 40f36f Sleep 46803->46804 46804->46803 46806 434a15 46805->46806 46806->46508 46807 4434bf 46806->46807 47170 44323c 46807->47170 46810->46491 46811->46495 46812->46499 46813->46497 46814->46510 46815->46513 46816->46517 46817->46519 46822 44fbe8 46818->46822 46821 438fda 8 API calls 3 library calls 46821->46524 46823 44fc05 46822->46823 46826 44fc01 46822->46826 46823->46826 46828 449d26 46823->46828 46825 43464e 46825->46522 46825->46821 46840 43502b 46826->46840 46829 449d32 CallCatchBlock 46828->46829 46847 445909 EnterCriticalSection 46829->46847 46831 449d39 46848 450203 46831->46848 46833 449d48 46834 449d57 46833->46834 46859 449bba 23 API calls 46833->46859 46861 449d73 LeaveCriticalSection std::_Lockit::~_Lockit 46834->46861 46837 449d52 46860 449c70 GetStdHandle GetFileType 46837->46860 46839 449d68 CallCatchBlock 46839->46823 46841 435036 IsProcessorFeaturePresent 46840->46841 46842 435034 46840->46842 46844 435078 46841->46844 46842->46825 46883 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46844->46883 46846 43515b 46846->46825 46847->46831 46849 45020f CallCatchBlock 46848->46849 46850 450233 46849->46850 46851 45021c 46849->46851 46862 445909 EnterCriticalSection 46850->46862 46870 44062d 20 API calls __dosmaperr 46851->46870 46854 450221 CallCatchBlock __wsopen_s 46854->46833 46855 45023f 46858 45026b 46855->46858 46863 450154 46855->46863 46871 450292 LeaveCriticalSection std::_Lockit::~_Lockit 46858->46871 46859->46837 46860->46834 46861->46839 46862->46855 46872 445b74 46863->46872 46865 450166 46869 450173 46865->46869 46879 448b04 11 API calls 2 library calls 46865->46879 46868 4501c5 46868->46855 46880 446802 20 API calls __dosmaperr 46869->46880 46870->46854 46871->46854 46878 445b81 ___crtLCMapStringA 46872->46878 46873 445bc1 46882 44062d 20 API calls __dosmaperr 46873->46882 46874 445bac RtlAllocateHeap 46876 445bbf 46874->46876 46874->46878 46876->46865 46878->46873 46878->46874 46881 443001 7 API calls 2 library calls 46878->46881 46879->46865 46880->46868 46881->46878 46882->46876 46883->46846 46885 434bb8 GetStartupInfoW 46884->46885 46885->46528 46887 44f0eb 46886->46887 46888 44f0e2 46886->46888 46887->46531 46891 44efd8 48 API calls 5 library calls 46888->46891 46890->46531 46891->46887 46893 41cc20 LoadLibraryA GetProcAddress 46892->46893 46894 41cc10 GetModuleHandleA GetProcAddress 46892->46894 46895 41cc49 44 API calls 46893->46895 46896 41cc39 LoadLibraryA GetProcAddress 46893->46896 46894->46893 46895->46536 46896->46895 47074 41b539 FindResourceA 46897->47074 46901 40f428 ctype 47084 4020b7 46901->47084 46904 401fe2 28 API calls 46905 40f44e 46904->46905 46906 401fd8 11 API calls 46905->46906 46907 40f457 46906->46907 46908 43bda0 new 21 API calls 46907->46908 46909 40f468 ctype 46908->46909 47090 406e13 46909->47090 46911 40f49b 46911->46538 46913 40210c 46912->46913 46914 4023ce 11 API calls 46913->46914 46915 402126 46914->46915 46916 402569 28 API calls 46915->46916 46917 402134 46916->46917 46917->46541 47144 4020df 46918->47144 46920 41bf2f 46921 401fd8 11 API calls 46920->46921 46922 41bf61 46921->46922 46924 401fd8 11 API calls 46922->46924 46923 41bf31 47150 4041a2 28 API calls 46923->47150 46927 41bf69 46924->46927 46929 401fd8 11 API calls 46927->46929 46928 41bf3d 46931 401fe2 28 API calls 46928->46931 46930 40ea5f 46929->46930 46940 40fb52 46930->46940 46933 41bf46 46931->46933 46932 401fe2 28 API calls 46939 41bebf 46932->46939 46934 401fd8 11 API calls 46933->46934 46936 41bf4e 46934->46936 46935 401fd8 11 API calls 46935->46939 47151 41cec5 28 API calls 46936->47151 46939->46920 46939->46923 46939->46932 46939->46935 47148 4041a2 28 API calls 46939->47148 47149 41cec5 28 API calls 46939->47149 46941 40fb5e 46940->46941 46943 40fb65 46940->46943 47152 402163 11 API calls 46941->47152 46943->46546 46945 402163 46944->46945 46946 40219f 46945->46946 47153 402730 11 API calls 46945->47153 46946->46548 46948 402184 47154 402712 11 API calls std::_Deallocate 46948->47154 46950->46553 46951->46558 46952->46561 46953->46565 46955 401ff1 46954->46955 46956 402039 46954->46956 46957 4023ce 11 API calls 46955->46957 46963 401fd8 46956->46963 46958 401ffa 46957->46958 46959 40203c 46958->46959 46960 402015 46958->46960 47156 40267a 11 API calls 46959->47156 47155 403098 28 API calls 46960->47155 46964 4023ce 11 API calls 46963->46964 46965 401fe1 46964->46965 46965->46573 46966->46577 46967->46579 46968->46581 46969->46583 46970->46590 47157 401fab 46971->47157 46973 40d0ae CreateMutexA GetLastError 46973->46594 46974->46554 46975->46556 46976->46562 46977->46566 46979->46587 46980->46600 46981->46599 46982->46608 46983->46601 46984->46611 46985->46621 46986->46613 46987->46628 46988->46603 46989->46610 46990->46620 46991->46626 46992->46629 46993->46634 46994->46639 46995->46643 46996->46649 46997->46651 46998->46653 46999->46660 47000->46666 47001->46672 47002->46679 47003->46683 47004->46687 47005->46659 47006->46664 47007->46671 47008->46678 47009->46684 47010->46688 47011->46692 47012->46699 47013->46703 47014->46708 47015->46712 47016->46673 47017->46676 47018->46685 47019->46693 47020->46695 47021->46698 47022->46704 47023->46707 47024->46711 47025->46715 47026->46717 47027->46719 47028->46721 47029->46723 47030->46725 47031->46727 47032->46729 47033->46731 47034->46734 47035->46736 47038 434563 47036->47038 47037 43bda0 new 21 API calls 47037->47038 47038->47037 47039 40f10c 47038->47039 47158 443001 7 API calls 2 library calls 47038->47158 47159 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47038->47159 47160 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47038->47160 47043 401e65 22 API calls 47039->47043 47043->46742 47044->46744 47045->46750 47046->46752 47047->46756 47048->46761 47049->46770 47050->46775 47051->46782 47052->46758 47053->46763 47054->46772 47055->46783 47056->46757 47057->46764 47058->46766 47059->46771 47060->46787 47062->46791 47063->46796 47064->46800 47065->46803 47066->46609 47068->46623 47069->46633 47070->46638 47071->46642 47072->46645 47161 41ada8 104 API calls 47073->47161 47075 41b556 LoadResource LockResource SizeofResource 47074->47075 47076 40f419 47074->47076 47075->47076 47077 43bda0 47076->47077 47083 4461b8 ___crtLCMapStringA 47077->47083 47078 4461f6 47094 44062d 20 API calls __dosmaperr 47078->47094 47079 4461e1 RtlAllocateHeap 47081 4461f4 47079->47081 47079->47083 47081->46901 47083->47078 47083->47079 47093 443001 7 API calls 2 library calls 47083->47093 47085 4020bf 47084->47085 47095 4023ce 47085->47095 47087 4020ca 47099 40250a 47087->47099 47089 4020d9 47089->46904 47091 4020b7 28 API calls 47090->47091 47092 406e27 47091->47092 47092->46911 47093->47083 47094->47081 47096 402428 47095->47096 47097 4023d8 47095->47097 47096->47087 47097->47096 47106 4027a7 11 API calls std::_Deallocate 47097->47106 47100 40251a 47099->47100 47101 402520 47100->47101 47102 402535 47100->47102 47107 402569 47101->47107 47117 4028e8 47102->47117 47105 402533 47105->47089 47106->47096 47128 402888 47107->47128 47109 40257d 47110 402592 47109->47110 47111 4025a7 47109->47111 47133 402a34 22 API calls 47110->47133 47112 4028e8 28 API calls 47111->47112 47116 4025a5 47112->47116 47114 40259b 47134 4029da 22 API calls 47114->47134 47116->47105 47118 4028f1 47117->47118 47119 402953 47118->47119 47120 4028fb 47118->47120 47142 4028a4 22 API calls 47119->47142 47123 402904 47120->47123 47124 402917 47120->47124 47136 402cae 47123->47136 47125 402915 47124->47125 47127 4023ce 11 API calls 47124->47127 47125->47105 47127->47125 47129 402890 47128->47129 47130 402898 47129->47130 47135 402ca3 22 API calls 47129->47135 47130->47109 47133->47114 47134->47116 47137 402cb8 __EH_prolog 47136->47137 47143 402e54 22 API calls 47137->47143 47139 4023ce 11 API calls 47141 402d92 47139->47141 47140 402d24 47140->47139 47141->47125 47143->47140 47145 4020e7 47144->47145 47146 4023ce 11 API calls 47145->47146 47147 4020f2 47146->47147 47147->46939 47148->46939 47149->46939 47150->46928 47151->46920 47152->46943 47153->46948 47154->46946 47155->46956 47156->46956 47158->47038 47169 412829 61 API calls 47165->47169 47171 443248 _abort 47170->47171 47172 443396 _abort GetModuleHandleW 47171->47172 47180 443260 47171->47180 47174 443254 47172->47174 47174->47180 47204 4433da GetModuleHandleExW 47174->47204 47175 443268 47179 4432dd 47175->47179 47189 443306 47175->47189 47212 443ff0 20 API calls _abort 47175->47212 47183 4432f5 47179->47183 47213 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47179->47213 47192 445909 EnterCriticalSection 47180->47192 47181 443323 47196 443355 47181->47196 47182 44334f 47215 4577a9 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47182->47215 47214 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47183->47214 47193 443346 47189->47193 47192->47175 47216 445951 LeaveCriticalSection 47193->47216 47195 44331f 47195->47181 47195->47182 47217 448d49 47196->47217 47199 443383 47202 4433da _abort 8 API calls 47199->47202 47200 443363 GetPEB 47200->47199 47201 443373 GetCurrentProcess TerminateProcess 47200->47201 47201->47199 47203 44338b ExitProcess 47202->47203 47205 443404 GetProcAddress 47204->47205 47206 443427 47204->47206 47209 443419 47205->47209 47207 443436 47206->47207 47208 44342d FreeLibrary 47206->47208 47210 43502b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 47207->47210 47208->47207 47209->47206 47211 443440 47210->47211 47211->47180 47212->47179 47213->47183 47214->47189 47216->47195 47218 448d64 47217->47218 47219 448d6e 47217->47219 47221 43502b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 47218->47221 47223 44854a 47219->47223 47222 44335f 47221->47222 47222->47199 47222->47200 47224 44857a 47223->47224 47227 448576 47223->47227 47224->47218 47225 44859a 47225->47224 47228 4485a6 GetProcAddress 47225->47228 47227->47224 47227->47225 47230 4485e6 47227->47230 47229 4485b6 __crt_fast_encode_pointer 47228->47229 47229->47224 47231 448607 LoadLibraryExW 47230->47231 47236 4485fc 47230->47236 47232 448624 GetLastError 47231->47232 47233 44863c 47231->47233 47232->47233 47234 44862f LoadLibraryExW 47232->47234 47235 448653 FreeLibrary 47233->47235 47233->47236 47234->47233 47235->47236 47236->47227 47237 40165e 47238 401666 47237->47238 47239 401669 47237->47239 47240 4016a8 47239->47240 47242 401696 47239->47242 47241 43455e new 22 API calls 47240->47241 47244 40169c 47241->47244 47243 43455e new 22 API calls 47242->47243 47243->47244

                                        Control-flow Graph

                                        APIs
                                        • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                        • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                        • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                        • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                        • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                        • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                        • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                        • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                        • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                        • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                        • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                        • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                        • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                        • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                        • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                        • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                        • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                        • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                        • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                        • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                        • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                        • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                        • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                        • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad$HandleModule
                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                        • API String ID: 4236061018-3687161714
                                        • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                        • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                        • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                        • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG,004461B7,00000003), ref: 00443376
                                        • TerminateProcess.KERNEL32(00000000), ref: 0044337D
                                        • ExitProcess.KERNEL32 ref: 0044338F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID: PkGNG
                                        • API String ID: 1703294689-263838557
                                        • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                        • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                        • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                        • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88

                                        Control-flow Graph

                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                        • SetEvent.KERNEL32(?), ref: 00404E43
                                        • CloseHandle.KERNELBASE(?), ref: 00404E4C
                                        • closesocket.WS2_32(?), ref: 00404E5A
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                                        • SetEvent.KERNEL32(?), ref: 00404EA2
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                                        • SetEvent.KERNEL32(?), ref: 00404EBA
                                        • CloseHandle.KERNEL32(?), ref: 00404EBF
                                        • CloseHandle.KERNEL32(?), ref: 00404EC4
                                        • SetEvent.KERNEL32(?), ref: 00404ED1
                                        • CloseHandle.KERNEL32(?), ref: 00404ED6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                        • String ID: PkGNG
                                        • API String ID: 3658366068-263838557
                                        • Opcode ID: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                        • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                        • Opcode Fuzzy Hash: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                        • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 30 4485e6-4485fa 31 448607-448622 LoadLibraryExW 30->31 32 4485fc-448605 30->32 34 448624-44862d GetLastError 31->34 35 44864b-448651 31->35 33 44865e-448660 32->33 36 44863c 34->36 37 44862f-44863a LoadLibraryExW 34->37 38 448653-448654 FreeLibrary 35->38 39 44865a 35->39 40 44863e-448640 36->40 37->40 38->39 41 44865c-44865d 39->41 40->35 42 448642-448649 40->42 41->33 42->41
                                        APIs
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                        • GetLastError.KERNEL32(?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID:
                                        • API String ID: 3177248105-0
                                        • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                        • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                        • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                        • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 43 40d0a4-40d0d0 call 401fab CreateMutexA GetLastError
                                        APIs
                                        • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                        • GetLastError.KERNEL32 ref: 0040D0BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateErrorLastMutex
                                        • String ID: SG
                                        • API String ID: 1925916568-3189917014
                                        • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                        • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                        • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                        • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 46 44854a-448574 47 448576-448578 46->47 48 4485df 46->48 49 44857e-448584 47->49 50 44857a-44857c 47->50 51 4485e1-4485e5 48->51 52 448586-448588 call 4485e6 49->52 53 4485a0 49->53 50->51 56 44858d-448590 52->56 55 4485a2-4485a4 53->55 57 4485a6-4485b4 GetProcAddress 55->57 58 4485cf-4485dd 55->58 59 4485c1-4485c7 56->59 60 448592-448598 56->60 61 4485b6-4485bf call 434591 57->61 62 4485c9 57->62 58->48 59->55 60->52 64 44859a 60->64 61->50 62->58 64->53
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004485AA
                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc__crt_fast_encode_pointer
                                        • String ID:
                                        • API String ID: 2279764990-0
                                        • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                        • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                                        • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                        • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 66 40165e-401664 67 401666-401668 66->67 68 401669-401674 66->68 69 401676 68->69 70 40167b-401685 68->70 69->70 71 401687-40168d 70->71 72 4016a8-4016a9 call 43455e 70->72 71->72 73 40168f-401694 71->73 76 4016ae-4016af 72->76 73->69 75 401696-4016a6 call 43455e 73->75 78 4016b1-4016b3 75->78 76->78
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                        • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                        • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                        • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 94 450154-450161 call 445b74 96 450166-450171 94->96 97 450177-45017f 96->97 98 450173-450175 96->98 99 4501bf-4501cd call 446802 97->99 100 450181-450185 97->100 98->99 101 450187-4501b9 call 448b04 100->101 106 4501bb-4501be 101->106 106->99
                                        APIs
                                          • Part of subcall function 00445B74: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000), ref: 00445BB5
                                        • _free.LIBCMT ref: 004501C0
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateHeap_free
                                        • String ID:
                                        • API String ID: 614378929-0
                                        • Opcode ID: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                        • Instruction ID: 1bf88885f7a62dfe3e195aa205353632c6f85cb380d5d404dcdd82bf2c99678c
                                        • Opcode Fuzzy Hash: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                        • Instruction Fuzzy Hash: DB014976200744ABE731CF6ACC42D5AFBD8EB85370F25062EE58483281EB34A909C779

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 107 445b74-445b7f 108 445b81-445b8b 107->108 109 445b8d-445b93 107->109 108->109 110 445bc1-445bcc call 44062d 108->110 111 445b95-445b96 109->111 112 445bac-445bbd RtlAllocateHeap 109->112 116 445bce-445bd0 110->116 111->112 113 445bbf 112->113 114 445b98-445b9f call 4455c6 112->114 113->116 114->110 120 445ba1-445baa call 443001 114->120 120->110 120->112
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000), ref: 00445BB5
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                        • Instruction ID: ef76d3429b2572ee2e16b707a9c356192af24cfd4e901c13b73aaad13af6506a
                                        • Opcode Fuzzy Hash: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                        • Instruction Fuzzy Hash: BEF0B431500F65ABBF222E22AC05E5B3769DB81770B14412BB914EA286CA38FC0186AC

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 123 4461b8-4461c4 124 4461f6-446201 call 44062d 123->124 125 4461c6-4461c8 123->125 133 446203-446205 124->133 126 4461e1-4461f2 RtlAllocateHeap 125->126 127 4461ca-4461cb 125->127 129 4461f4 126->129 130 4461cd-4461d4 call 4455c6 126->130 127->126 129->133 130->124 135 4461d6-4461df call 443001 130->135 135->124 135->126
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                        • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                        • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                        • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                        APIs
                                        • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                        • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                        • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                          • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                          • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                          • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                        • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                        • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                        • DeleteFileA.KERNEL32(?), ref: 0040868D
                                          • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                          • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                          • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                          • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                        • Sleep.KERNEL32(000007D0), ref: 00408733
                                        • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                          • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                        • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                        • API String ID: 1067849700-181434739
                                        • Opcode ID: 2d13e027d7d5250f2079b09e426665e5b64f596e7788c4e00595e4e8e35796ad
                                        • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                        • Opcode Fuzzy Hash: 2d13e027d7d5250f2079b09e426665e5b64f596e7788c4e00595e4e8e35796ad
                                        • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                        APIs
                                        • __Init_thread_footer.LIBCMT ref: 004056E6
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        • __Init_thread_footer.LIBCMT ref: 00405723
                                        • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                        • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                        • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                        • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                        • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                        • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                        • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                        • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                        • CloseHandle.KERNEL32 ref: 00405A23
                                        • CloseHandle.KERNEL32 ref: 00405A2B
                                        • CloseHandle.KERNEL32 ref: 00405A3D
                                        • CloseHandle.KERNEL32 ref: 00405A45
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                        • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                        • API String ID: 2994406822-18413064
                                        • Opcode ID: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                                        • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                        • Opcode Fuzzy Hash: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                                        • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                        APIs
                                        • GetCurrentProcessId.KERNEL32 ref: 00412141
                                          • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                          • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                          • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                        • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                        • CloseHandle.KERNEL32(00000000), ref: 00412190
                                        • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                        • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                        • API String ID: 3018269243-13974260
                                        • Opcode ID: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                                        • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                        • Opcode Fuzzy Hash: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                                        • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                        • FindClose.KERNEL32(00000000), ref: 0040BC04
                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                        • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$CloseFile$FirstNext
                                        • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                        • API String ID: 1164774033-3681987949
                                        • Opcode ID: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                                        • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                        • Opcode Fuzzy Hash: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                                        • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                        APIs
                                        • OpenClipboard.USER32 ref: 004168FD
                                        • EmptyClipboard.USER32 ref: 0041690B
                                        • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                        • GlobalLock.KERNEL32(00000000), ref: 00416934
                                        • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                        • CloseClipboard.USER32 ref: 00416990
                                        • OpenClipboard.USER32 ref: 00416997
                                        • GetClipboardData.USER32(0000000D), ref: 004169A7
                                        • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                        • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                        • CloseClipboard.USER32 ref: 004169BF
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                        • String ID: !D@
                                        • API String ID: 3520204547-604454484
                                        • Opcode ID: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                                        • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                        • Opcode Fuzzy Hash: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                                        • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                        • FindClose.KERNEL32(00000000), ref: 0040BE04
                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                        • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                        • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Close$File$FirstNext
                                        • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                        • API String ID: 3527384056-432212279
                                        • Opcode ID: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                                        • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                        • Opcode Fuzzy Hash: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                                        • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 0041A04A
                                        • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                        • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                        • GetLocalTime.KERNEL32(?), ref: 0041A196
                                        • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                        • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                        • API String ID: 489098229-1431523004
                                        • Opcode ID: 95e2b2175dcad42d57fc42b688d4a52931778c628c4b554f4f231ba9717664a4
                                        • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                        • Opcode Fuzzy Hash: 95e2b2175dcad42d57fc42b688d4a52931778c628c4b554f4f231ba9717664a4
                                        • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                        APIs
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                        • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                        • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                        • API String ID: 3756808967-1743721670
                                        • Opcode ID: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                                        • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                        • Opcode Fuzzy Hash: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                                        • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 0$1$2$3$4$5$6$7$VG
                                        • API String ID: 0-1861860590
                                        • Opcode ID: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                                        • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                        • Opcode Fuzzy Hash: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                                        • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                        APIs
                                        • _wcslen.LIBCMT ref: 0040755C
                                        • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Object_wcslen
                                        • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                        • API String ID: 240030777-3166923314
                                        • Opcode ID: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                        • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                        • Opcode Fuzzy Hash: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                        • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                        APIs
                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                        • GetLastError.KERNEL32 ref: 0041A84C
                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                        • String ID:
                                        • API String ID: 3587775597-0
                                        • Opcode ID: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                                        • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                        • Opcode Fuzzy Hash: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                                        • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                        • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                        • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$CloseFile$FirstNext
                                        • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                        • API String ID: 1164774033-405221262
                                        • Opcode ID: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                                        • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                        • Opcode Fuzzy Hash: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                                        • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C41F
                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C42C
                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                        • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C44D
                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                        • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C473
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                        • String ID:
                                        • API String ID: 2341273852-0
                                        • Opcode ID: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                        • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                        • Opcode Fuzzy Hash: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                        • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                        • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Find$CreateFirstNext
                                        • String ID: 8SG$PXG$PXG$NG$PG
                                        • API String ID: 341183262-3812160132
                                        • Opcode ID: 2aa8bf03968caedae2c1f783026ec1f2ab33015732b8bfe7ccea484fd5ec6f7f
                                        • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                        • Opcode Fuzzy Hash: 2aa8bf03968caedae2c1f783026ec1f2ab33015732b8bfe7ccea484fd5ec6f7f
                                        • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                        APIs
                                        • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                        • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                        • GetLastError.KERNEL32 ref: 0040A328
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                        • TranslateMessage.USER32(?), ref: 0040A385
                                        • DispatchMessageA.USER32(?), ref: 0040A390
                                        Strings
                                        • Keylogger initialization failure: error , xrefs: 0040A33C
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                        • String ID: Keylogger initialization failure: error
                                        • API String ID: 3219506041-952744263
                                        • Opcode ID: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                                        • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                        • Opcode Fuzzy Hash: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                                        • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                                        APIs
                                        • GetForegroundWindow.USER32 ref: 0040A451
                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                        • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                        • GetKeyState.USER32(00000010), ref: 0040A46E
                                        • GetKeyboardState.USER32(?), ref: 0040A479
                                        • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                        • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                        • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                        • String ID:
                                        • API String ID: 1888522110-0
                                        • Opcode ID: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                        • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                        • Opcode Fuzzy Hash: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                        • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                        APIs
                                        • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                        • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressCloseCreateLibraryLoadProcsend
                                        • String ID: SHDeleteKeyW$Shlwapi.dll
                                        • API String ID: 2127411465-314212984
                                        • Opcode ID: 09788986c499ccf61a32fa2fa99dcd6ee3d0b3087326da66d508dcd15781bba8
                                        • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                        • Opcode Fuzzy Hash: 09788986c499ccf61a32fa2fa99dcd6ee3d0b3087326da66d508dcd15781bba8
                                        • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                        APIs
                                          • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                          • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                          • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                          • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                          • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                        • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                        • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                        • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                        • String ID: !D@$PowrProf.dll$SetSuspendState
                                        • API String ID: 1589313981-2876530381
                                        • Opcode ID: d444d066f4fdad4d35a34b464d43113e8d04464aaad5ec9ebe6089587c88fb6e
                                        • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                        • Opcode Fuzzy Hash: d444d066f4fdad4d35a34b464d43113e8d04464aaad5ec9ebe6089587c88fb6e
                                        • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                        APIs
                                        • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                        • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                        • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                        • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                        • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                        Strings
                                        • http://geoplugin.net/json.gp, xrefs: 0041B448
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandleOpen$FileRead
                                        • String ID: http://geoplugin.net/json.gp
                                        • API String ID: 3121278467-91888290
                                        • Opcode ID: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                                        • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                        • Opcode Fuzzy Hash: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                                        • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                        APIs
                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                        • GetLastError.KERNEL32 ref: 0040BA93
                                        Strings
                                        • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                        • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                        • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                        • UserProfile, xrefs: 0040BA59
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DeleteErrorFileLast
                                        • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                        • API String ID: 2018770650-1062637481
                                        • Opcode ID: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                                        • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                        • Opcode Fuzzy Hash: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                                        • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                        • GetLastError.KERNEL32 ref: 004179D8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                        • String ID: SeShutdownPrivilege
                                        • API String ID: 3534403312-3733053543
                                        • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                        • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                        • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                        • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00409293
                                          • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                        • FindClose.KERNEL32(00000000), ref: 004093FC
                                          • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                          • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                          • Part of subcall function 00404E26: CloseHandle.KERNELBASE(?), ref: 00404E4C
                                        • FindClose.KERNEL32(00000000), ref: 004095F4
                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                        • String ID:
                                        • API String ID: 1824512719-0
                                        • Opcode ID: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                                        • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                        • Opcode Fuzzy Hash: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                                        • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: FSE$FSE$PkGNG
                                        • API String ID: 0-1266307253
                                        • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                        • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                        • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                        • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                        APIs
                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                        • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$Open$ManagerStart
                                        • String ID:
                                        • API String ID: 276877138-0
                                        • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                        • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                        • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                        • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                        APIs
                                          • Part of subcall function 00413584: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                          • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                          • Part of subcall function 00413584: RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                                        • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                        • ExitProcess.KERNEL32 ref: 0040F905
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseExitOpenProcessQuerySleepValue
                                        • String ID: 5.1.3 Pro$override$pth_unenc
                                        • API String ID: 2281282204-1392497409
                                        • Opcode ID: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                                        • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                        • Opcode Fuzzy Hash: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                                        • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 00452555
                                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0045257E
                                        • GetACP.KERNEL32 ref: 00452593
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID: ACP$OCP
                                        • API String ID: 2299586839-711371036
                                        • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                        • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                        • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                        • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                        APIs
                                        • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                        • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                        • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                        • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Resource$FindLoadLockSizeof
                                        • String ID: SETTINGS
                                        • API String ID: 3473537107-594951305
                                        • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                        • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                        • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                        • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 004096A5
                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                        • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstH_prologNext
                                        • String ID:
                                        • API String ID: 1157919129-0
                                        • Opcode ID: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                                        • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                        • Opcode Fuzzy Hash: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                                        • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                        • GetUserDefaultLCID.KERNEL32 ref: 0045279C
                                        • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045286D
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                        • String ID:
                                        • API String ID: 745075371-0
                                        • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                        • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                        • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                        • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 0040884C
                                        • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                        • String ID:
                                        • API String ID: 1771804793-0
                                        • Opcode ID: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                                        • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                        • Opcode Fuzzy Hash: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                                        • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                        APIs
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DownloadExecuteFileShell
                                        • String ID: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe$open
                                        • API String ID: 2825088817-3877602440
                                        • Opcode ID: 7772d264ec74869141b014490c566259b039335beacd565e5cb36fd33a70e94b
                                        • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                        • Opcode Fuzzy Hash: 7772d264ec74869141b014490c566259b039335beacd565e5cb36fd33a70e94b
                                        • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                        • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileFind$FirstNextsend
                                        • String ID: XPG$XPG
                                        • API String ID: 4113138495-1962359302
                                        • Opcode ID: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                                        • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                        • Opcode Fuzzy Hash: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                                        • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                        APIs
                                        • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                          • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                          • Part of subcall function 004137AA: RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                          • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateInfoParametersSystemValue
                                        • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                        • API String ID: 4127273184-3576401099
                                        • Opcode ID: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                                        • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                        • Opcode Fuzzy Hash: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                                        • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                        APIs
                                        • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                          • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                          • Part of subcall function 004137AA: RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                          • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateInfoParametersSystemValue
                                        • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                        • API String ID: 4127273184-3576401099
                                        • Opcode ID: 1be57db16bc80fa37d3a9003a2ea5f51ddd37d0b47a9f0501ac93dd6eaa9563f
                                        • Instruction ID: 1d4fccf664b116fd7e9026c1daa93839c24cbfeedf45b0e65449f5778d70c30d
                                        • Opcode Fuzzy Hash: 1be57db16bc80fa37d3a9003a2ea5f51ddd37d0b47a9f0501ac93dd6eaa9563f
                                        • Instruction Fuzzy Hash: DBF0C272BC421022D82931B96DAFBFE18058742F61F15412BF302652CAD4CE6A81428F
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                        • IsValidCodePage.KERNEL32(00000000), ref: 00451E3A
                                        • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                        • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00451F7B
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                        • String ID:
                                        • API String ID: 4212172061-0
                                        • Opcode ID: 715b93ef3f017ee4fea0110e94a068843382a27aff4af5d2daf4b4fdd25eb79d
                                        • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                        • Opcode Fuzzy Hash: 715b93ef3f017ee4fea0110e94a068843382a27aff4af5d2daf4b4fdd25eb79d
                                        • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                        APIs
                                        • _free.LIBCMT ref: 0044943D
                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                        • GetTimeZoneInformation.KERNEL32 ref: 0044944F
                                        • WideCharToMultiByte.KERNEL32(00000000,?,00472764,000000FF,?,0000003F,?,?), ref: 004494C7
                                        • WideCharToMultiByte.KERNEL32(00000000,?,004727B8,000000FF,?,0000003F,?,?,?,00472764,000000FF,?,0000003F,?,?), ref: 004494F4
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                        • String ID:
                                        • API String ID: 806657224-0
                                        • Opcode ID: aeb37be2ef55a5d103ab6b4be93faccb032caed00e04dd613037f001c8cf3bb4
                                        • Instruction ID: d52e19fe16dfdee109f40d049db845c42e01460133d57766726f1505d2785bee
                                        • Opcode Fuzzy Hash: aeb37be2ef55a5d103ab6b4be93faccb032caed00e04dd613037f001c8cf3bb4
                                        • Instruction Fuzzy Hash: 2D31F371904205EFDB15DF69CE8186EBBB8FF0572072446AFE024A73A1D3748D41EB28
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorInfoLastLocale$_free$_abort
                                        • String ID:
                                        • API String ID: 2829624132-0
                                        • Opcode ID: 711793eb573856c12bfad09b44d2354213151b00c391b4c97ce46ce3e25352d9
                                        • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                        • Opcode Fuzzy Hash: 711793eb573856c12bfad09b44d2354213151b00c391b4c97ce46ce3e25352d9
                                        • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                        • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                        • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                        • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                        APIs
                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,00433550,00000034,?,?,00000000), ref: 004338DA
                                        • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?), ref: 004338F0
                                        • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?,0041E2E2), ref: 00433902
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$Context$AcquireRandomRelease
                                        • String ID:
                                        • API String ID: 1815803762-0
                                        • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                        • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                        • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                        • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                        APIs
                                        • OpenClipboard.USER32(00000000), ref: 0040B74C
                                        • GetClipboardData.USER32(0000000D), ref: 0040B758
                                        • CloseClipboard.USER32 ref: 0040B760
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Clipboard$CloseDataOpen
                                        • String ID:
                                        • API String ID: 2058664381-0
                                        • Opcode ID: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                        • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                        • Opcode Fuzzy Hash: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                        • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FeaturePresentProcessor
                                        • String ID:
                                        • API String ID: 2325560087-3916222277
                                        • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                        • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                        • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                        • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID: GetLocaleInfoEx
                                        • API String ID: 2299586839-2904428671
                                        • Opcode ID: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                                        • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                        • Opcode Fuzzy Hash: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                                        • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                        • HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$FreeProcess
                                        • String ID:
                                        • API String ID: 3859560861-0
                                        • Opcode ID: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                                        • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                                        • Opcode Fuzzy Hash: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                                        • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$_free$InfoLocale_abort
                                        • String ID:
                                        • API String ID: 1663032902-0
                                        • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                        • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                        • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                        • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                        • EnumSystemLocalesW.KERNEL32(00452143,00000001), ref: 0045208D
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                        • String ID:
                                        • API String ID: 1084509184-0
                                        • Opcode ID: cd62537e8c3e003b13522b9155b4eea68fe7d0001d8d421cd242523031e004a2
                                        • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                        • Opcode Fuzzy Hash: cd62537e8c3e003b13522b9155b4eea68fe7d0001d8d421cd242523031e004a2
                                        • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$InfoLocale_abort_free
                                        • String ID:
                                        • API String ID: 2692324296-0
                                        • Opcode ID: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                        • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                        • Opcode Fuzzy Hash: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                        • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                        • EnumSystemLocalesW.KERNEL32(00452393,00000001), ref: 00452102
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                        • String ID:
                                        • API String ID: 1084509184-0
                                        • Opcode ID: b47e8d7704c3cea33439bb1b9c4b2a0344765dc89a2caae7295f0002ba586764
                                        • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                        • Opcode Fuzzy Hash: b47e8d7704c3cea33439bb1b9c4b2a0344765dc89a2caae7295f0002ba586764
                                        • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                        APIs
                                        • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: NameUser
                                        • String ID:
                                        • API String ID: 2645101109-0
                                        • Opcode ID: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                        • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                        • Opcode Fuzzy Hash: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                        • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                        APIs
                                          • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                        • EnumSystemLocalesW.KERNEL32(Function_0004843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                        • String ID:
                                        • API String ID: 1272433827-0
                                        • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                        • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                        • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                        • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                        • EnumSystemLocalesW.KERNEL32(00451F27,00000001), ref: 00452007
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                        • String ID:
                                        • API String ID: 1084509184-0
                                        • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                        • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                        • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                        • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                        APIs
                                        • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                        • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                        • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                        • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                        • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                        • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                        • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                          • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                        • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                        • DeleteDC.GDI32(00000000), ref: 00418F65
                                        • DeleteDC.GDI32(00000000), ref: 00418F68
                                        • DeleteObject.GDI32(00000000), ref: 00418F6B
                                        • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                        • DeleteDC.GDI32(00000000), ref: 00418F9D
                                        • DeleteDC.GDI32(00000000), ref: 00418FA0
                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                        • GetIconInfo.USER32(?,?), ref: 00418FF8
                                        • DeleteObject.GDI32(?), ref: 00419027
                                        • DeleteObject.GDI32(?), ref: 00419034
                                        • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                        • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                        • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                        • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                        • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                        • DeleteDC.GDI32(?), ref: 004191B7
                                        • DeleteDC.GDI32(00000000), ref: 004191BA
                                        • DeleteObject.GDI32(00000000), ref: 004191BD
                                        • GlobalFree.KERNEL32(?), ref: 004191C8
                                        • DeleteObject.GDI32(00000000), ref: 0041927C
                                        • GlobalFree.KERNEL32(?), ref: 00419283
                                        • DeleteDC.GDI32(?), ref: 00419293
                                        • DeleteDC.GDI32(00000000), ref: 0041929E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                        • String ID: DISPLAY
                                        • API String ID: 479521175-865373369
                                        • Opcode ID: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                                        • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                        • Opcode Fuzzy Hash: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                                        • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                        APIs
                                        • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                        • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                        • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                        • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                        • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                        • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                        • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                        • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                        • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                        • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                        • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                        • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                        • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                        • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                        • ResumeThread.KERNEL32(?), ref: 00418470
                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                        • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                        • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                        • GetLastError.KERNEL32 ref: 004184B5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                        • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                        • API String ID: 4188446516-3035715614
                                        • Opcode ID: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                        • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                        • Opcode Fuzzy Hash: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                        • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                                        APIs
                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                          • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                          • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                        • ExitProcess.KERNEL32 ref: 0040D80B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                        • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                        • API String ID: 1861856835-1447701601
                                        • Opcode ID: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                                        • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                        • Opcode Fuzzy Hash: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                                        • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                        APIs
                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                          • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                        • ExitProcess.KERNEL32 ref: 0040D454
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                        • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                        • API String ID: 3797177996-2483056239
                                        • Opcode ID: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                                        • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                        • Opcode Fuzzy Hash: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                                        • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                        APIs
                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                        • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                        • CloseHandle.KERNEL32(00000000), ref: 00412576
                                        • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                        • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                        • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                        • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                          • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                        • Sleep.KERNEL32(000001F4), ref: 004126BD
                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                        • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                        • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                        • String ID: .exe$8SG$WDH$exepath$open$temp_
                                        • API String ID: 2649220323-436679193
                                        • Opcode ID: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                                        • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                        • Opcode Fuzzy Hash: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                                        • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                        APIs
                                        • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                        • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                        • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                        • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                        • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                        • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                        • SetEvent.KERNEL32 ref: 0041B2AA
                                        • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                        • CloseHandle.KERNEL32 ref: 0041B2CB
                                        • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                        • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                        • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                        • API String ID: 738084811-2094122233
                                        • Opcode ID: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                                        • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                        • Opcode Fuzzy Hash: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                                        • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                        APIs
                                        • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                        • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                        • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                        • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                        • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                        • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                        • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                        • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                        • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                        • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Write$Create
                                        • String ID: RIFF$WAVE$data$fmt
                                        • API String ID: 1602526932-4212202414
                                        • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                        • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                        • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                        • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                        APIs
                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\AppData\Roaming\pvTSOIBBT.exe,00000001,00407688,C:\Users\user\AppData\Roaming\pvTSOIBBT.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                        • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                        • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                        • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                        • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                        • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                        • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                        • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                        • API String ID: 1646373207-2925723319
                                        • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                        • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                        • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                        • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$EnvironmentVariable$_wcschr
                                        • String ID: ?
                                        • API String ID: 3899193279-3073664681
                                        • Opcode ID: 546d6b1eb3b41f64b2e76db450b04a782591562765fde2d4f0a87aa2ff6224bf
                                        • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                        • Opcode Fuzzy Hash: 546d6b1eb3b41f64b2e76db450b04a782591562765fde2d4f0a87aa2ff6224bf
                                        • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                        APIs
                                        • _wcslen.LIBCMT ref: 0040CE42
                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                        • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\pvTSOIBBT.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                        • _wcslen.LIBCMT ref: 0040CF21
                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                        • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\pvTSOIBBT.exe,00000000,00000000), ref: 0040CFBF
                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                        • _wcslen.LIBCMT ref: 0040D001
                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                        • ExitProcess.KERNEL32 ref: 0040D09D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                        • String ID: 6$C:\Users\user\AppData\Roaming\pvTSOIBBT.exe$del$open
                                        • API String ID: 1579085052-3826493956
                                        • Opcode ID: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                                        • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                        • Opcode Fuzzy Hash: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                                        • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                        APIs
                                        • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                        • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                        • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                        • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                        • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                        • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                        • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                        • _wcslen.LIBCMT ref: 0041C1CC
                                        • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                        • GetLastError.KERNEL32 ref: 0041C204
                                        • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                        • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                        • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                        • GetLastError.KERNEL32 ref: 0041C261
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                        • String ID: ?
                                        • API String ID: 3941738427-1684325040
                                        • Opcode ID: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                        • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                        • Opcode Fuzzy Hash: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                        • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                        • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                        • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                        • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                        • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                        • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                        • String ID: EIA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                        • API String ID: 2490988753-3346362794
                                        • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                        • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                        • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                        • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                        APIs
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                        • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                        • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                        • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                        • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                        • Sleep.KERNEL32(00000064), ref: 00412ECF
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                        • String ID: /stext "$0TG$0TG$NG$NG
                                        • API String ID: 1223786279-2576077980
                                        • Opcode ID: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                                        • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                        • Opcode Fuzzy Hash: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                                        • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                        APIs
                                        • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                        • GetCursorPos.USER32(?), ref: 0041D67A
                                        • SetForegroundWindow.USER32(?), ref: 0041D683
                                        • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                        • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                        • ExitProcess.KERNEL32 ref: 0041D6F6
                                        • CreatePopupMenu.USER32 ref: 0041D6FC
                                        • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                        • String ID: Close
                                        • API String ID: 1657328048-3535843008
                                        • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                        • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                        • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                        • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$Info
                                        • String ID:
                                        • API String ID: 2509303402-0
                                        • Opcode ID: 75151fbced3465edae0101cd141662f582d879f03032417287744dbc83fd132d
                                        • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                        • Opcode Fuzzy Hash: 75151fbced3465edae0101cd141662f582d879f03032417287744dbc83fd132d
                                        • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                        APIs
                                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                        • __aulldiv.LIBCMT ref: 00408D88
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                        • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                        • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                        • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                        • CloseHandle.KERNEL32(00000000), ref: 00409037
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                        • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                        • API String ID: 3086580692-2582957567
                                        • Opcode ID: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                                        • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                        • Opcode Fuzzy Hash: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                                        • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                        APIs
                                        • Sleep.KERNEL32(00001388), ref: 0040A77B
                                          • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                          • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                          • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                          • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                        • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                        • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                        • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                        • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,00000000,00000000,00000000), ref: 0040A962
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                        • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                        • API String ID: 3795512280-1152054767
                                        • Opcode ID: 3a6890873391c1654b11869ae3dec1ec00b921b871674c2992e755d8024bb7d9
                                        • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                        • Opcode Fuzzy Hash: 3a6890873391c1654b11869ae3dec1ec00b921b871674c2992e755d8024bb7d9
                                        • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                                        APIs
                                        • connect.WS2_32(?,?,?), ref: 004048E0
                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                        • WSAGetLastError.WS2_32 ref: 00404A21
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                        • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                        • API String ID: 994465650-3229884001
                                        • Opcode ID: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                                        • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                        • Opcode Fuzzy Hash: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                                        • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                                        APIs
                                        • ___free_lconv_mon.LIBCMT ref: 0045138A
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                        • _free.LIBCMT ref: 0045137F
                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                        • _free.LIBCMT ref: 004513A1
                                        • _free.LIBCMT ref: 004513B6
                                        • _free.LIBCMT ref: 004513C1
                                        • _free.LIBCMT ref: 004513E3
                                        • _free.LIBCMT ref: 004513F6
                                        • _free.LIBCMT ref: 00451404
                                        • _free.LIBCMT ref: 0045140F
                                        • _free.LIBCMT ref: 00451447
                                        • _free.LIBCMT ref: 0045144E
                                        • _free.LIBCMT ref: 0045146B
                                        • _free.LIBCMT ref: 00451483
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                        • String ID:
                                        • API String ID: 161543041-0
                                        • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                        • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                        • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                        • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                        APIs
                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                          • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                          • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                          • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                        • ExitProcess.KERNEL32 ref: 0040D9FF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                        • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                        • API String ID: 1913171305-3159800282
                                        • Opcode ID: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                                        • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                        • Opcode Fuzzy Hash: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                                        • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free
                                        • String ID:
                                        • API String ID: 269201875-0
                                        • Opcode ID: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                        • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                        • Opcode Fuzzy Hash: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                        • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                        APIs
                                          • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                        • GetLastError.KERNEL32 ref: 00455D6F
                                        • __dosmaperr.LIBCMT ref: 00455D76
                                        • GetFileType.KERNEL32(00000000), ref: 00455D82
                                        • GetLastError.KERNEL32 ref: 00455D8C
                                        • __dosmaperr.LIBCMT ref: 00455D95
                                        • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                        • CloseHandle.KERNEL32(?), ref: 00455EFF
                                        • GetLastError.KERNEL32 ref: 00455F31
                                        • __dosmaperr.LIBCMT ref: 00455F38
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                        • String ID: H
                                        • API String ID: 4237864984-2852464175
                                        • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                        • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                        • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                        • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,tC,0043EA74,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006), ref: 0044AD23
                                        • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006,?,?,?), ref: 0044ADA9
                                        • __alloca_probe_16.LIBCMT ref: 0044AE40
                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,A4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                        • __freea.LIBCMT ref: 0044AEB0
                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                        • __freea.LIBCMT ref: 0044AEB9
                                        • __freea.LIBCMT ref: 0044AEDE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                        • String ID: PkGNG$tC
                                        • API String ID: 3864826663-4196309852
                                        • Opcode ID: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                        • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                        • Opcode Fuzzy Hash: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                        • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free
                                        • String ID: \&G$\&G$`&G
                                        • API String ID: 269201875-253610517
                                        • Opcode ID: 0a05fa7fafc3926735f9ff598043b48751ea8cfb3e4d07056946ce3260a8f3c6
                                        • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                        • Opcode Fuzzy Hash: 0a05fa7fafc3926735f9ff598043b48751ea8cfb3e4d07056946ce3260a8f3c6
                                        • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 65535$udp
                                        • API String ID: 0-1267037602
                                        • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                        • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                        • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                        • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                        APIs
                                        • __Init_thread_footer.LIBCMT ref: 0040AD73
                                        • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                        • GetForegroundWindow.USER32 ref: 0040AD84
                                        • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                        • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                        • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                        • String ID: [${ User has been idle for $ minutes }$]
                                        • API String ID: 911427763-3954389425
                                        • Opcode ID: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                                        • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                        • Opcode Fuzzy Hash: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                                        • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                                        APIs
                                        • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LongNamePath
                                        • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                        • API String ID: 82841172-425784914
                                        • Opcode ID: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                                        • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                        • Opcode Fuzzy Hash: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                                        • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                        • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                        • __dosmaperr.LIBCMT ref: 0043A926
                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                        • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                        • __dosmaperr.LIBCMT ref: 0043A963
                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                        • __dosmaperr.LIBCMT ref: 0043A9B7
                                        • _free.LIBCMT ref: 0043A9C3
                                        • _free.LIBCMT ref: 0043A9CA
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                        • String ID:
                                        • API String ID: 2441525078-0
                                        • Opcode ID: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                        • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                        • Opcode Fuzzy Hash: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                        • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                        APIs
                                        • SetEvent.KERNEL32(?,?), ref: 004054BF
                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                        • TranslateMessage.USER32(?), ref: 0040557E
                                        • DispatchMessageA.USER32(?), ref: 00405589
                                        • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                        • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                        • String ID: CloseChat$DisplayMessage$GetMessage
                                        • API String ID: 2956720200-749203953
                                        • Opcode ID: 39c70f7a9fb62d047285317ad68f4ff50d9b26878aa9747946ac0a7af0469701
                                        • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                        • Opcode Fuzzy Hash: 39c70f7a9fb62d047285317ad68f4ff50d9b26878aa9747946ac0a7af0469701
                                        • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                        APIs
                                          • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                        • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                        • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                        • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                        • String ID: 0VG$0VG$<$@$Temp
                                        • API String ID: 1704390241-2575729100
                                        • Opcode ID: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                                        • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                        • Opcode Fuzzy Hash: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                                        • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                        APIs
                                        • OpenClipboard.USER32 ref: 0041697C
                                        • EmptyClipboard.USER32 ref: 0041698A
                                        • CloseClipboard.USER32 ref: 00416990
                                        • OpenClipboard.USER32 ref: 00416997
                                        • GetClipboardData.USER32(0000000D), ref: 004169A7
                                        • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                        • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                        • CloseClipboard.USER32 ref: 004169BF
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                        • String ID: !D@
                                        • API String ID: 2172192267-604454484
                                        • Opcode ID: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                                        • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                        • Opcode Fuzzy Hash: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                                        • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                        APIs
                                        • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                        • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                        • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                        • CloseHandle.KERNEL32(?), ref: 004134A0
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                        • String ID:
                                        • API String ID: 297527592-0
                                        • Opcode ID: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                        • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                        • Opcode Fuzzy Hash: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                        • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                        APIs
                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                        • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$Open$ControlManager
                                        • String ID:
                                        • API String ID: 221034970-0
                                        • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                        • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                        • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                        • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                        APIs
                                        • _free.LIBCMT ref: 004481B5
                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                        • _free.LIBCMT ref: 004481C1
                                        • _free.LIBCMT ref: 004481CC
                                        • _free.LIBCMT ref: 004481D7
                                        • _free.LIBCMT ref: 004481E2
                                        • _free.LIBCMT ref: 004481ED
                                        • _free.LIBCMT ref: 004481F8
                                        • _free.LIBCMT ref: 00448203
                                        • _free.LIBCMT ref: 0044820E
                                        • _free.LIBCMT ref: 0044821C
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                        • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                        • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                        • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Eventinet_ntoa
                                        • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                        • API String ID: 3578746661-3604713145
                                        • Opcode ID: 38c3c7176244b4b6310fd9205d8951a2ba4c04effc7f855f37438cca8d95bfb9
                                        • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                        • Opcode Fuzzy Hash: 38c3c7176244b4b6310fd9205d8951a2ba4c04effc7f855f37438cca8d95bfb9
                                        • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                        APIs
                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DecodePointer
                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                        • API String ID: 3527080286-3064271455
                                        • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                        • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                        • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                        • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                        APIs
                                        • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                        • __fassign.LIBCMT ref: 0044B4F9
                                        • __fassign.LIBCMT ref: 0044B514
                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                        • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B559
                                        • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B592
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                        • String ID: PkGNG
                                        • API String ID: 1324828854-263838557
                                        • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                        • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                        • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                        • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                        APIs
                                        • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                        • Sleep.KERNEL32(00000064), ref: 0041755C
                                        • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CreateDeleteExecuteShellSleep
                                        • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                        • API String ID: 1462127192-2001430897
                                        • Opcode ID: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                                        • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                        • Opcode Fuzzy Hash: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                                        • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\AppData\Roaming\pvTSOIBBT.exe), ref: 004074D9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CurrentProcess
                                        • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                        • API String ID: 2050909247-4242073005
                                        • Opcode ID: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                                        • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                        • Opcode Fuzzy Hash: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                                        • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                        APIs
                                        • _strftime.LIBCMT ref: 00401D50
                                          • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                        • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                        • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                        • API String ID: 3809562944-243156785
                                        • Opcode ID: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                                        • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                        • Opcode Fuzzy Hash: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                                        • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                        • int.LIBCPMT ref: 00410EBC
                                          • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                          • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                        • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                        • __Init_thread_footer.LIBCMT ref: 00410F64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                        • String ID: ,kG$0kG
                                        • API String ID: 3815856325-2015055088
                                        • Opcode ID: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                                        • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                        • Opcode Fuzzy Hash: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                                        • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                        APIs
                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                        • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                        • waveInStart.WINMM ref: 00401CFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                        • String ID: dMG$|MG$PG
                                        • API String ID: 1356121797-532278878
                                        • Opcode ID: e50daa58507802a607b8e69ff53587dfa1525f8723cff621260b0af96f5d677f
                                        • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                        • Opcode Fuzzy Hash: e50daa58507802a607b8e69ff53587dfa1525f8723cff621260b0af96f5d677f
                                        • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                          • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                          • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                          • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                        • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                        • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                        • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                        • TranslateMessage.USER32(?), ref: 0041D57A
                                        • DispatchMessageA.USER32(?), ref: 0041D584
                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                        • String ID: Remcos
                                        • API String ID: 1970332568-165870891
                                        • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                        • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                        • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                        • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                        • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                        • Opcode Fuzzy Hash: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                        • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                        APIs
                                        • GetCPInfo.KERNEL32(?,?), ref: 00453EAF
                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453F32
                                        • __alloca_probe_16.LIBCMT ref: 00453F6A
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453FC5
                                        • __alloca_probe_16.LIBCMT ref: 00454014
                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453FDC
                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00454058
                                        • __freea.LIBCMT ref: 00454083
                                        • __freea.LIBCMT ref: 0045408F
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                        • String ID:
                                        • API String ID: 201697637-0
                                        • Opcode ID: 0e4c9693fbb30d8259a9360a9357c9a64508312006b92e836ecbd2da2b3ae83b
                                        • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                        • Opcode Fuzzy Hash: 0e4c9693fbb30d8259a9360a9357c9a64508312006b92e836ecbd2da2b3ae83b
                                        • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                        APIs
                                          • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                        • _memcmp.LIBVCRUNTIME ref: 004454A4
                                        • _free.LIBCMT ref: 00445515
                                        • _free.LIBCMT ref: 0044552E
                                        • _free.LIBCMT ref: 00445560
                                        • _free.LIBCMT ref: 00445569
                                        • _free.LIBCMT ref: 00445575
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$ErrorLast$_abort_memcmp
                                        • String ID: C
                                        • API String ID: 1679612858-1037565863
                                        • Opcode ID: 2813a1e0ac90985d52fee0968b9a0cfa35de9e1761f336dc1444ec918196fcc8
                                        • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                        • Opcode Fuzzy Hash: 2813a1e0ac90985d52fee0968b9a0cfa35de9e1761f336dc1444ec918196fcc8
                                        • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: tcp$udp
                                        • API String ID: 0-3725065008
                                        • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                        • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                        • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                        • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                        APIs
                                        • __Init_thread_footer.LIBCMT ref: 004018BE
                                        • ExitThread.KERNEL32 ref: 004018F6
                                        • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                        • String ID: PkG$XMG$NG$NG
                                        • API String ID: 1649129571-3151166067
                                        • Opcode ID: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                                        • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                        • Opcode Fuzzy Hash: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                                        • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                        APIs
                                        • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                        • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                        • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                        • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                          • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                          • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                        • String ID: .part
                                        • API String ID: 1303771098-3499674018
                                        • Opcode ID: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                                        • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                        • Opcode Fuzzy Hash: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                                        • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                        APIs
                                        • SendInput.USER32 ref: 00419A25
                                        • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                        • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                          • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InputSend$Virtual
                                        • String ID:
                                        • API String ID: 1167301434-0
                                        • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                        • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                        • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                        • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __freea$__alloca_probe_16_free
                                        • String ID: a/p$am/pm$h{D
                                        • API String ID: 2936374016-2303565833
                                        • Opcode ID: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                        • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                        • Opcode Fuzzy Hash: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                        • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                        APIs
                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                        • _free.LIBCMT ref: 00444E87
                                        • _free.LIBCMT ref: 00444E9E
                                        • _free.LIBCMT ref: 00444EBD
                                        • _free.LIBCMT ref: 00444ED8
                                        • _free.LIBCMT ref: 00444EEF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$AllocateHeap
                                        • String ID: KED
                                        • API String ID: 3033488037-2133951994
                                        • Opcode ID: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                        • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                        • Opcode Fuzzy Hash: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                        • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                        APIs
                                        • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                        • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Enum$InfoQueryValue
                                        • String ID: [regsplt]$xUG$TG
                                        • API String ID: 3554306468-1165877943
                                        • Opcode ID: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                                        • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                        • Opcode Fuzzy Hash: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                                        • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                          • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                          • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnumInfoOpenQuerysend
                                        • String ID: xUG$NG$NG$TG
                                        • API String ID: 3114080316-2811732169
                                        • Opcode ID: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                                        • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                        • Opcode Fuzzy Hash: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                                        • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F918,?,00000000,?,00000001,?,000000FF,00000001,0043F918,?), ref: 004511F9
                                        • __alloca_probe_16.LIBCMT ref: 00451231
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451282
                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451294
                                        • __freea.LIBCMT ref: 0045129D
                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                        • String ID: PkGNG
                                        • API String ID: 313313983-263838557
                                        • Opcode ID: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                        • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                        • Opcode Fuzzy Hash: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                        • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                        APIs
                                          • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                          • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                          • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                        • _wcslen.LIBCMT ref: 0041B7F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                        • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                        • API String ID: 37874593-122982132
                                        • Opcode ID: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                                        • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                        • Opcode Fuzzy Hash: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                                        • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                        APIs
                                          • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                          • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                          • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                                        • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                        • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                        • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                        • API String ID: 1133728706-4073444585
                                        • Opcode ID: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                                        • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                        • Opcode Fuzzy Hash: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                                        • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                        • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                        • Opcode Fuzzy Hash: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                        • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                        APIs
                                          • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                        • _free.LIBCMT ref: 00450FC8
                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                        • _free.LIBCMT ref: 00450FD3
                                        • _free.LIBCMT ref: 00450FDE
                                        • _free.LIBCMT ref: 00451032
                                        • _free.LIBCMT ref: 0045103D
                                        • _free.LIBCMT ref: 00451048
                                        • _free.LIBCMT ref: 00451053
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                        • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                        • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                        • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                        • int.LIBCPMT ref: 004111BE
                                          • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                          • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                        • std::_Facet_Register.LIBCPMT ref: 004111FE
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                        • String ID: (mG
                                        • API String ID: 2536120697-4059303827
                                        • Opcode ID: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                        • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                        • Opcode Fuzzy Hash: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                        • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                        APIs
                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                          • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                          • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                          • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                                        • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCurrentOpenProcessQueryValue
                                        • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                        • API String ID: 1866151309-2070987746
                                        • Opcode ID: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                                        • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                        • Opcode Fuzzy Hash: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                                        • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                                        APIs
                                        • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                        • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                        • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                        • Opcode Fuzzy Hash: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                        • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                        APIs
                                        • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\AppData\Roaming\pvTSOIBBT.exe), ref: 0040760B
                                          • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                          • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                        • CoUninitialize.OLE32 ref: 00407664
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InitializeObjectUninitialize_wcslen
                                        • String ID: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                        • API String ID: 3851391207-2188077323
                                        • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                        • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                        • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                        • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                        APIs
                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                        • GetLastError.KERNEL32 ref: 0040BB22
                                        Strings
                                        • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                        • [Chrome Cookies not found], xrefs: 0040BB3C
                                        • UserProfile, xrefs: 0040BAE8
                                        • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DeleteErrorFileLast
                                        • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                        • API String ID: 2018770650-304995407
                                        • Opcode ID: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                                        • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                        • Opcode Fuzzy Hash: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                                        • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                        APIs
                                        • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                        • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                        • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Console$AllocOutputShowWindow
                                        • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                        • API String ID: 2425139147-2212855755
                                        • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                        • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                        • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                        • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002), ref: 004433FA
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                        • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG), ref: 00443430
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$PkGNG$mscoree.dll
                                        • API String ID: 4061214504-213444651
                                        • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                        • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                        • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                        • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                        APIs
                                        • __allrem.LIBCMT ref: 0043ACE9
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                        • __allrem.LIBCMT ref: 0043AD1C
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                        • __allrem.LIBCMT ref: 0043AD51
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                        • String ID:
                                        • API String ID: 1992179935-0
                                        • Opcode ID: 52068ab3a7cfe922dfe01ed446ba536eb0656cd97dd847f62b494b0202e28e08
                                        • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                        • Opcode Fuzzy Hash: 52068ab3a7cfe922dfe01ed446ba536eb0656cd97dd847f62b494b0202e28e08
                                        • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                        APIs
                                        • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                          • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: H_prologSleep
                                        • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                        • API String ID: 3469354165-3054508432
                                        • Opcode ID: 492085be5e5afa04f3b0ed8f778f66d71a1b6d1d42094c5c2204b2a4f3ed0bf8
                                        • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                        • Opcode Fuzzy Hash: 492085be5e5afa04f3b0ed8f778f66d71a1b6d1d42094c5c2204b2a4f3ed0bf8
                                        • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                        APIs
                                          • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                        • SetLastError.KERNEL32(000000C1,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                        • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                        • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,00000000), ref: 00411E04
                                          • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00411CEE
                                        • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,00000000), ref: 00411E4B
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411E52
                                        • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411F65
                                          • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                          • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                        • String ID:
                                        • API String ID: 3950776272-0
                                        • Opcode ID: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                        • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                        • Opcode Fuzzy Hash: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                        • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __cftoe
                                        • String ID:
                                        • API String ID: 4189289331-0
                                        • Opcode ID: dfe269b3e7c89c95b27fedd159a696e88b5656ec827068c0169833f59e794ee9
                                        • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                        • Opcode Fuzzy Hash: dfe269b3e7c89c95b27fedd159a696e88b5656ec827068c0169833f59e794ee9
                                        • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                        APIs
                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                        • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                        • String ID:
                                        • API String ID: 493672254-0
                                        • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                        • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                        • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                        • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __alldvrm$_strrchr
                                        • String ID: PkGNG
                                        • API String ID: 1036877536-263838557
                                        • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                        • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                        • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                        • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                        APIs
                                        • GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                        • _free.LIBCMT ref: 004482CC
                                        • _free.LIBCMT ref: 004482F4
                                        • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                        • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                        • _abort.LIBCMT ref: 00448313
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$_free$_abort
                                        • String ID:
                                        • API String ID: 3160817290-0
                                        • Opcode ID: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                        • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                        • Opcode Fuzzy Hash: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                        • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                        APIs
                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$Open$ControlManager
                                        • String ID:
                                        • API String ID: 221034970-0
                                        • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                        • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                        • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                        • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                        APIs
                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                        • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$Open$ControlManager
                                        • String ID:
                                        • API String ID: 221034970-0
                                        • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                        • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                        • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                        • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                        APIs
                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                        • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Service$CloseHandle$Open$ControlManager
                                        • String ID:
                                        • API String ID: 221034970-0
                                        • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                        • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                        • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                        • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free
                                        • String ID: @^E
                                        • API String ID: 269201875-2908066071
                                        • Opcode ID: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                        • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                        • Opcode Fuzzy Hash: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                        • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: PkGNG
                                        • API String ID: 0-263838557
                                        • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                        • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                        • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                        • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                        APIs
                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                        • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                                        • CloseHandle.KERNEL32(?), ref: 00404DDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                        • String ID: PkGNG
                                        • API String ID: 3360349984-263838557
                                        • Opcode ID: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                                        • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                        • Opcode Fuzzy Hash: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                                        • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                        APIs
                                        • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                        • wsprintfW.USER32 ref: 0040B22E
                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: EventLocalTimewsprintf
                                        • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                        • API String ID: 1497725170-248792730
                                        • Opcode ID: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                                        • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                        • Opcode Fuzzy Hash: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                                        • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ?
                                        • API String ID: 0-3073664681
                                        • Opcode ID: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                        • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                        • Opcode Fuzzy Hash: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                        • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                        APIs
                                        • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                        • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                        • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseCreateHandleSizeSleep
                                        • String ID: XQG
                                        • API String ID: 1958988193-3606453820
                                        • Opcode ID: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                                        • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                        • Opcode Fuzzy Hash: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                                        • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                        APIs
                                        • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                        • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                        • GetLastError.KERNEL32 ref: 0041D611
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ClassCreateErrorLastRegisterWindow
                                        • String ID: 0$MsgWindowClass
                                        • API String ID: 2877667751-2410386613
                                        • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                        • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                        • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                        • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                        APIs
                                        • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                        • CloseHandle.KERNEL32(?), ref: 004077E5
                                        • CloseHandle.KERNEL32(?), ref: 004077EA
                                        Strings
                                        • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                        • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandle$CreateProcess
                                        • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                        • API String ID: 2922976086-4183131282
                                        • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                        • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                        • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                        • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                        Strings
                                        • SG, xrefs: 00407715
                                        • C:\Users\user\AppData\Roaming\pvTSOIBBT.exe, xrefs: 004076FF
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: SG$C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                        • API String ID: 0-884497436
                                        • Opcode ID: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                                        • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                        • Opcode Fuzzy Hash: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                                        • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                        APIs
                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                        • SetEvent.KERNEL32(?), ref: 0040512C
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                        • CloseHandle.KERNEL32(?), ref: 00405140
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                        • String ID: KeepAlive | Disabled
                                        • API String ID: 2993684571-305739064
                                        • Opcode ID: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                                        • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                        • Opcode Fuzzy Hash: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                                        • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                        APIs
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                        • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                        • Sleep.KERNEL32(00002710), ref: 0041AE98
                                        • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: PlaySound$HandleLocalModuleSleepTime
                                        • String ID: Alarm triggered
                                        • API String ID: 614609389-2816303416
                                        • Opcode ID: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                                        • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                        • Opcode Fuzzy Hash: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                                        • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                        • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                        • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                        • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                        Strings
                                        • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Console$AttributeText$BufferHandleInfoScreen
                                        • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                        • API String ID: 3024135584-2418719853
                                        • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                        • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                        • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                        • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                        • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                        • Opcode Fuzzy Hash: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                        • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                        APIs
                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                        • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                          • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 4269425633-0
                                        • Opcode ID: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                                        • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                        • Opcode Fuzzy Hash: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                                        • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free
                                        • String ID:
                                        • API String ID: 269201875-0
                                        • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                        • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                        • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                        • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                        APIs
                                        • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                        • _free.LIBCMT ref: 0044F43F
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                        • String ID:
                                        • API String ID: 336800556-0
                                        • Opcode ID: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                        • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                        • Opcode Fuzzy Hash: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                        • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                        APIs
                                        • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4DE
                                        • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4EA
                                        • WriteFile.KERNEL32(00000000,00000000,00000000,00406FC0,00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4FB
                                        • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C508
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseHandle$CreatePointerWrite
                                        • String ID:
                                        • API String ID: 1852769593-0
                                        • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                        • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                        • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                        • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                        APIs
                                        • GetLastError.KERNEL32(?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044831E
                                        • _free.LIBCMT ref: 00448353
                                        • _free.LIBCMT ref: 0044837A
                                        • SetLastError.KERNEL32(00000000), ref: 00448387
                                        • SetLastError.KERNEL32(00000000), ref: 00448390
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$_free
                                        • String ID:
                                        • API String ID: 3170660625-0
                                        • Opcode ID: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                        • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                        • Opcode Fuzzy Hash: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                        • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                        APIs
                                        • _free.LIBCMT ref: 00450A54
                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                        • _free.LIBCMT ref: 00450A66
                                        • _free.LIBCMT ref: 00450A78
                                        • _free.LIBCMT ref: 00450A8A
                                        • _free.LIBCMT ref: 00450A9C
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                        • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                        • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                        • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                        APIs
                                        • _free.LIBCMT ref: 00444106
                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                        • _free.LIBCMT ref: 00444118
                                        • _free.LIBCMT ref: 0044412B
                                        • _free.LIBCMT ref: 0044413C
                                        • _free.LIBCMT ref: 0044414D
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                        • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                        • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                        • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: PkGNG
                                        • API String ID: 0-263838557
                                        • Opcode ID: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                        • Instruction ID: da8fb74aa53f7b39327717419ea6793f6800af9799f3d5c2cf6102f7e15971fb
                                        • Opcode Fuzzy Hash: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                        • Instruction Fuzzy Hash: 1451C171D00209AAEF109FA5D885BAFBBB8EF45314F14015FE905A7291CB38D911CBA9
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CountEventTick
                                        • String ID: !D@$NG
                                        • API String ID: 180926312-2721294649
                                        • Opcode ID: e52fc7a95dc10006057367343353241763694e7611518825ed9a516dfd40078b
                                        • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                        • Opcode Fuzzy Hash: e52fc7a95dc10006057367343353241763694e7611518825ed9a516dfd40078b
                                        • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                        APIs
                                        • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                          • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                          • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFileKeyboardLayoutNameconnectsend
                                        • String ID: XQG$NG$PG
                                        • API String ID: 1634807452-3565412412
                                        • Opcode ID: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                                        • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                        • Opcode Fuzzy Hash: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                                        • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\pvTSOIBBT.exe,00000104), ref: 00443515
                                        • _free.LIBCMT ref: 004435E0
                                        • _free.LIBCMT ref: 004435EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free$FileModuleName
                                        • String ID: C:\Users\user\AppData\Roaming\pvTSOIBBT.exe
                                        • API String ID: 2506810119-2624567355
                                        • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                        • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                        • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                        • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BBFE,?,00000000,FF8BC35D), ref: 0044B952
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B980
                                        • GetLastError.KERNEL32 ref: 0044B9B1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharErrorFileLastMultiWideWrite
                                        • String ID: PkGNG
                                        • API String ID: 2456169464-263838557
                                        • Opcode ID: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                        • Instruction ID: 31ac96f82a5847659344ef20b41dc67af7a50504b34fbd786f6314a6cc22fa3b
                                        • Opcode Fuzzy Hash: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                        • Instruction Fuzzy Hash: B13161B5A102199FDB14CF59DD819EAB7B9FB08305F0444BEE90AD7251D734ED80CBA4
                                        APIs
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                        • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                        • String ID: /sort "Visit Time" /stext "$0NG
                                        • API String ID: 368326130-3219657780
                                        • Opcode ID: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                                        • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                        • Opcode Fuzzy Hash: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                                        • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                        APIs
                                        • _wcslen.LIBCMT ref: 00416330
                                          • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                          • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                          • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                          • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _wcslen$CloseCreateValue
                                        • String ID: !D@$okmode$PG
                                        • API String ID: 3411444782-3370592832
                                        • Opcode ID: 35fbf123078c83e442a4a08110d0a28feb217dd0509abb738719859e34f9bafd
                                        • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                        • Opcode Fuzzy Hash: 35fbf123078c83e442a4a08110d0a28feb217dd0509abb738719859e34f9bafd
                                        • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                        APIs
                                          • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                        • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                        Strings
                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                        • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExistsFilePath
                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                        • API String ID: 1174141254-1980882731
                                        • Opcode ID: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                                        • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                        • Opcode Fuzzy Hash: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                                        • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                        APIs
                                          • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                        • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                        Strings
                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                        • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExistsFilePath
                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                        • API String ID: 1174141254-1980882731
                                        • Opcode ID: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                                        • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                        • Opcode Fuzzy Hash: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                                        • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                        APIs
                                        • CreateThread.KERNEL32(00000000,00000000,0040A2B8,004750F0,00000000,00000000), ref: 0040A239
                                        • CreateThread.KERNEL32(00000000,00000000,0040A2A2,004750F0,00000000,00000000), ref: 0040A249
                                        • CreateThread.KERNEL32(00000000,00000000,0040A2C4,004750F0,00000000,00000000), ref: 0040A255
                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateThread$LocalTimewsprintf
                                        • String ID: Offline Keylogger Started
                                        • API String ID: 465354869-4114347211
                                        • Opcode ID: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                                        • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                        • Opcode Fuzzy Hash: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                                        • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                        APIs
                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040AFA9
                                        • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040AFB5
                                        • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateThread$LocalTime$wsprintf
                                        • String ID: Online Keylogger Started
                                        • API String ID: 112202259-1258561607
                                        • Opcode ID: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                                        • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                        • Opcode Fuzzy Hash: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                                        • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                        APIs
                                        • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LocalTime
                                        • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                        • API String ID: 481472006-3277280411
                                        • Opcode ID: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                                        • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                        • Opcode Fuzzy Hash: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                                        • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                        APIs
                                        • GetLocalTime.KERNEL32(?), ref: 00404F81
                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                        • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                        Strings
                                        • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Create$EventLocalThreadTime
                                        • String ID: KeepAlive | Enabled | Timeout:
                                        • API String ID: 2532271599-1507639952
                                        • Opcode ID: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                                        • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                        • Opcode Fuzzy Hash: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                                        • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                        APIs
                                        • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                        • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: CryptUnprotectData$crypt32
                                        • API String ID: 2574300362-2380590389
                                        • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                        • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                        • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                        • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                        APIs
                                        • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C382,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C30C
                                        • GetLastError.KERNEL32 ref: 0044C316
                                        • __dosmaperr.LIBCMT ref: 0044C31D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorFileLastPointer__dosmaperr
                                        • String ID: PkGNG
                                        • API String ID: 2336955059-263838557
                                        • Opcode ID: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                        • Instruction ID: 8193a85edd99f1e073baf55791db2896ff72ac9ff19ac05387a69161c0de0417
                                        • Opcode Fuzzy Hash: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                        • Instruction Fuzzy Hash: FB019032A11108BBDB01DFDDDC4586E7B19EB81320B28034EFD2097280EAB4DD119794
                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                        • CloseHandle.KERNEL32(?), ref: 004051CA
                                        • SetEvent.KERNEL32(?), ref: 004051D9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEventHandleObjectSingleWait
                                        • String ID: Connection Timeout
                                        • API String ID: 2055531096-499159329
                                        • Opcode ID: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                                        • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                        • Opcode Fuzzy Hash: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                                        • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                        APIs
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Exception@8Throw
                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                        • API String ID: 2005118841-1866435925
                                        • Opcode ID: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                        • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                        • Opcode Fuzzy Hash: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                        • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                        APIs
                                        • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB9A
                                        • LocalFree.KERNEL32(?,?), ref: 0041CBC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FormatFreeLocalMessage
                                        • String ID: @J@$PkGNG
                                        • API String ID: 1427518018-1416487119
                                        • Opcode ID: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                                        • Instruction ID: 923000db8f6a2d31ebee0df48ef62036c6bc2ff20d3f060cbaedccf048ea6ec3
                                        • Opcode Fuzzy Hash: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                                        • Instruction Fuzzy Hash: 34F0A930B00219A6DF14A766DC4ADFF772DDB44305B10407FB605B21D1DE785D059659
                                        APIs
                                        • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041385A
                                        • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,74DF37E0,?), ref: 00413888
                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,74DF37E0,?,?,?,?,?,0040CFE5,?,00000000), ref: 00413893
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413858
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateValue
                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                        • API String ID: 1818849710-1051519024
                                        • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                        • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                        • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                        • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                          • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                          • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                        • String ID: bad locale name
                                        • API String ID: 3628047217-1405518554
                                        • Opcode ID: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                        • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                        • Opcode Fuzzy Hash: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                        • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                        APIs
                                        • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                        • RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                        • RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateValue
                                        • String ID: Control Panel\Desktop
                                        • API String ID: 1818849710-27424756
                                        • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                        • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                        • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                        • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _free
                                        • String ID: ?$?
                                        • API String ID: 269201875-1378754261
                                        • Opcode ID: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                        • Instruction ID: 4a6f060c21597e0392f33703011e6e0157da39883ddad7ec559e06d861eb6f1f
                                        • Opcode Fuzzy Hash: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                        • Instruction Fuzzy Hash: 64E0E532A0152014F6713A3B6D1665B45C68BC1B3AF22423FF425962C2DFAC8946516E
                                        APIs
                                        • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                        • ShowWindow.USER32(00000009), ref: 00416C9C
                                        • SetForegroundWindow.USER32 ref: 00416CA8
                                          • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                          • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                          • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                        • String ID: !D@
                                        • API String ID: 3446828153-604454484
                                        • Opcode ID: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                                        • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                        • Opcode Fuzzy Hash: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                                        • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                        APIs
                                        • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExecuteShell
                                        • String ID: /C $cmd.exe$open
                                        • API String ID: 587946157-3896048727
                                        • Opcode ID: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                                        • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                        • Opcode Fuzzy Hash: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                                        • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                        • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: GetCursorInfo$User32.dll
                                        • API String ID: 1646373207-2714051624
                                        • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                        • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                        • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                        • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                        APIs
                                        • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                        • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetLastInputInfo$User32.dll
                                        • API String ID: 2574300362-1519888992
                                        • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                        • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                        • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                        • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                        APIs
                                        Strings
                                        • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                        • Cleared browsers logins and cookies., xrefs: 0040C130
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Sleep
                                        • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                        • API String ID: 3472027048-1236744412
                                        • Opcode ID: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                                        • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                        • Opcode Fuzzy Hash: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                                        • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                        APIs
                                          • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                          • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                          • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                        • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                        • Sleep.KERNEL32(00000064), ref: 0040A638
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Window$SleepText$ForegroundLength
                                        • String ID: [ $ ]
                                        • API String ID: 3309952895-93608704
                                        • Opcode ID: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                        • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                        • Opcode Fuzzy Hash: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                        • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                        • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                        • Opcode Fuzzy Hash: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                        • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                        APIs
                                        • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                        • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C543
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C568
                                        • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E84), ref: 0041C576
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseCreateHandleReadSize
                                        • String ID:
                                        • API String ID: 3919263394-0
                                        • Opcode ID: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                        • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                        • Opcode Fuzzy Hash: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                        • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                        APIs
                                        • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                        • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseHandleOpenProcess
                                        • String ID:
                                        • API String ID: 39102293-0
                                        • Opcode ID: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                        • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                        • Opcode Fuzzy Hash: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                        • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                        APIs
                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                          • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                        • _UnwindNestedFrames.LIBCMT ref: 00439911
                                        • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                        • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                        • String ID:
                                        • API String ID: 2633735394-0
                                        • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                        • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                        • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                        • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                        APIs
                                        • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                        • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                        • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                        • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: MetricsSystem
                                        • String ID:
                                        • API String ID: 4116985748-0
                                        • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                        • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                        • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                        • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                        APIs
                                        • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                        • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                        • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                          • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                        • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                        • String ID:
                                        • API String ID: 1761009282-0
                                        • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                        • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                        • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                        • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                        APIs
                                        • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorHandling__start
                                        • String ID: pow
                                        • API String ID: 3213639722-2276729525
                                        • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                        • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                        • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                        • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F8F
                                        • GetLastError.KERNEL32 ref: 00449FAB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharErrorLastMultiWide
                                        • String ID: PkGNG
                                        • API String ID: 203985260-263838557
                                        • Opcode ID: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                        • Instruction ID: e4919e29a80df6b7ced925805d10dfcffaa1b378e184719e11b938f1b8f94c7b
                                        • Opcode Fuzzy Hash: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                        • Instruction Fuzzy Hash: 2331E430200201ABFB21EF56C845BAB7768EF45721F15016BF815C7391DB38CD45E7A9
                                        APIs
                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                        • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Init_thread_footer__onexit
                                        • String ID: [End of clipboard]$[Text copied to clipboard]
                                        • API String ID: 1881088180-3686566968
                                        • Opcode ID: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                                        • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                        • Opcode Fuzzy Hash: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                                        • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                        APIs
                                        • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00451C92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ACP$OCP
                                        • API String ID: 0-711371036
                                        • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                        • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                        • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                        • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                        APIs
                                        • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BBEE,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B85B
                                        • GetLastError.KERNEL32 ref: 0044B884
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorFileLastWrite
                                        • String ID: PkGNG
                                        • API String ID: 442123175-263838557
                                        • Opcode ID: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                        • Instruction ID: 9972a58bdd01e134d13becd973f3089a2f7b3635eb9ddb95e5d59f4384582b5e
                                        • Opcode Fuzzy Hash: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                        • Instruction Fuzzy Hash: B2316F31A00619DBCB24DF59DD8099AF3F9FF48301B1485AAE909D7261E734ED81CBA8
                                        APIs
                                        • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BC0E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B76D
                                        • GetLastError.KERNEL32 ref: 0044B796
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorFileLastWrite
                                        • String ID: PkGNG
                                        • API String ID: 442123175-263838557
                                        • Opcode ID: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                        • Instruction ID: c865f2f287ade0309940dd9d446f9ab1351fd896516eb6f8948e0fb5ca6ebdce
                                        • Opcode Fuzzy Hash: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                        • Instruction Fuzzy Hash: 69219435600219DFDB14CF69D980BEAB3F9EB48312F1048AAE94AD7251D734ED85CB64
                                        APIs
                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                        Strings
                                        • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LocalTime
                                        • String ID: KeepAlive | Enabled | Timeout:
                                        • API String ID: 481472006-1507639952
                                        • Opcode ID: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                                        • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                        • Opcode Fuzzy Hash: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                                        • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                        APIs
                                        • Sleep.KERNEL32 ref: 0041667B
                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DownloadFileSleep
                                        • String ID: !D@
                                        • API String ID: 1931167962-604454484
                                        • Opcode ID: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                                        • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                        • Opcode Fuzzy Hash: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                                        • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                        APIs
                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExistsFilePath
                                        • String ID: alarm.wav$hYG
                                        • API String ID: 1174141254-2782910960
                                        • Opcode ID: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                                        • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                        • Opcode Fuzzy Hash: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                                        • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                        APIs
                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                        • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                        • UnhookWindowsHookEx.USER32 ref: 0040B102
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                        • String ID: Online Keylogger Stopped
                                        • API String ID: 1623830855-1496645233
                                        • Opcode ID: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                                        • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                        • Opcode Fuzzy Hash: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                                        • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                        APIs
                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,A4E85006,00000001,?,0043CEA5), ref: 00448CA4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: String
                                        • String ID: LCMapStringEx$PkGNG
                                        • API String ID: 2568140703-1065776982
                                        • Opcode ID: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                                        • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                        • Opcode Fuzzy Hash: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                                        • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                        APIs
                                        • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                        • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: wave$BufferHeaderPrepare
                                        • String ID: XMG
                                        • API String ID: 2315374483-813777761
                                        • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                        • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                        • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                        • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                        APIs
                                        • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LocaleValid
                                        • String ID: IsValidLocaleName$kKD
                                        • API String ID: 1901932003-3269126172
                                        • Opcode ID: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                                        • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                        • Opcode Fuzzy Hash: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                                        • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                        APIs
                                        • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExistsFilePath
                                        • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                        • API String ID: 1174141254-4188645398
                                        • Opcode ID: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                                        • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                        • Opcode Fuzzy Hash: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                                        • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                        APIs
                                        • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExistsFilePath
                                        • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                        • API String ID: 1174141254-2800177040
                                        • Opcode ID: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                                        • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                        • Opcode Fuzzy Hash: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                                        • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                        APIs
                                        • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExistsFilePath
                                        • String ID: AppData$\Opera Software\Opera Stable\
                                        • API String ID: 1174141254-1629609700
                                        • Opcode ID: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                                        • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                        • Opcode Fuzzy Hash: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                                        • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                        APIs
                                        • GetKeyState.USER32(00000011), ref: 0040B686
                                          • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                          • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                          • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                          • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                          • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                          • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                          • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                        • String ID: [AltL]$[AltR]
                                        • API String ID: 2738857842-2658077756
                                        • Opcode ID: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                                        • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                        • Opcode Fuzzy Hash: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                                        • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                        APIs
                                        • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Time$FileSystem
                                        • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                        • API String ID: 2086374402-949981407
                                        • Opcode ID: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                                        • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                        • Opcode Fuzzy Hash: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                                        • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                        APIs
                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExecuteShell
                                        • String ID: !D@$open
                                        • API String ID: 587946157-1586967515
                                        • Opcode ID: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                                        • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                        • Opcode Fuzzy Hash: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                                        • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                        APIs
                                        • ___initconout.LIBCMT ref: 004555DB
                                          • Part of subcall function 00456B9D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004555E0,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000), ref: 00456BB0
                                        • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB99,?), ref: 004555FE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ConsoleCreateFileWrite___initconout
                                        • String ID: PkGNG
                                        • API String ID: 3087715906-263838557
                                        • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                        • Instruction ID: 53f4b2898eb153bde3bf118a85e4039abf363423ff24ad7888d91dc13aa78fd6
                                        • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                        • Instruction Fuzzy Hash: C5E0EDB0100548BBDA208B69DC29EBA3328EB00331F500369FE29C62D2EB34EC44C769
                                        APIs
                                        • GetKeyState.USER32(00000012), ref: 0040B6E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: State
                                        • String ID: [CtrlL]$[CtrlR]
                                        • API String ID: 1649606143-2446555240
                                        • Opcode ID: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                                        • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                        • Opcode Fuzzy Hash: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                                        • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                        APIs
                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                        • __Init_thread_footer.LIBCMT ref: 00410F64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Init_thread_footer__onexit
                                        • String ID: ,kG$0kG
                                        • API String ID: 1881088180-2015055088
                                        • Opcode ID: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                                        • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                        • Opcode Fuzzy Hash: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                                        • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D509,00000000,?,00000000), ref: 00413A6C
                                        • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A80
                                        Strings
                                        • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DeleteOpenValue
                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                        • API String ID: 2654517830-1051519024
                                        • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                        • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                        • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                        • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                        • GetLastError.KERNEL32 ref: 00440D85
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide$ErrorLast
                                        • String ID:
                                        • API String ID: 1717984340-0
                                        • Opcode ID: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                        • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                        • Opcode Fuzzy Hash: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                        • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                        APIs
                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                        • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411CB5
                                        • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                        Memory Dump Source
                                        • Source File: 0000000E.00000002.1752596751.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_14_2_400000_pvTSOIBBT.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLastRead
                                        • String ID:
                                        • API String ID: 4100373531-0
                                        • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                        • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                        • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                        • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99